<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>BuddyPress.org | varunkamani | Mentions</title>
	<link>https://buddypress.org/members/varunkamani/activity/mentions/</link>
	<atom:link href="https://buddypress.org/members/varunkamani/activity/mentions/feed/" rel="self" type="application/rss+xml" />
	<description>Activity feed mentioning varunkamani.</description>
	<lastBuildDate>Sat, 11 Apr 2026 20:57:37 +0000</lastBuildDate>
	<generator>https://buddypress.org/?v=</generator>
	<language>en-US</language>
	<ttl>30</ttl>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>2</sy:updateFrequency>
	
						<item>
				<guid isPermaLink="false">f2d23d98f9543b84e97b1b5a4f602639</guid>
				<title>GyziieDK replied to the topic BuddyPress Global Search Vulnerability issue in the forum How-to &#038; Troubleshooting</title>
				<link>https://buddypress.org/support/topic/buddypress-global-search-vulnerability-issue/#post-335435</link>
				<pubDate>Tue, 29 Oct 2024 07:53:30 +0000</pubDate>

									<content:encoded><![CDATA[<p>Hello <a href="https://buddypress.org/members/varunkamani/" rel="nofollow ugc">@varunkamani</a></p>
<p>I already gave you a few options to choose from, so in the end it&#8217;s up to you.</p>
<p><strong>1. Ignore error and keep plugin</strong><br />
Keep the plugin and accept the fact that it comes with some issues and risks.<br />
The risk itself is pretty low when it comes to the XSS since this is pretty common.<br />
Like mentioned before, old and unsupported plugins do&hellip;<span class="activity-read-more" id="activity-read-more-3675748"><a href="https://buddypress.org/support/topic/buddypress-global-search-vulnerability-issue/#post-335435" rel="nofollow ugc">[Read more]</a></span></p>
]]></content:encoded>
				
				
							</item>
					<item>
				<guid isPermaLink="false">fa6a67391268dded42cc074e3db7fa96</guid>
				<title>GyziieDK replied to the topic BuddyPress Global Search Vulnerability issue in the forum How-to &#038; Troubleshooting</title>
				<link>https://buddypress.org/support/topic/buddypress-global-search-vulnerability-issue/#post-335391</link>
				<pubDate>Thu, 24 Oct 2024 07:45:44 +0000</pubDate>

									<content:encoded><![CDATA[<p><a href="https://buddypress.org/members/varunkamani/" rel="nofollow ugc">@varunkamani</a></p>
<p>This might also be worth looking into (might be worth it).</p>
<blockquote class="wp-embedded-content" data-secret="a3JWGX6GNl"><p><a href="https://wordpress.org/plugins/prevent-xss-vulnerability/" rel="nofollow ugc">Prevent XSS Vulnerability</a></p></blockquote>
<p><iframe loading="lazy" class="wp-embedded-content" sandbox="allow-scripts" security="restricted" style="position: absolute; visibility: hidden;" title="&#8220;Prevent XSS Vulnerability&#8221; &#8212; Plugin Directory" src="https://wordpress.org/plugins/prevent-xss-vulnerability/embed/#?secret=26vymB5c01#?secret=a3JWGX6GNl" data-secret="a3JWGX6GNl" width="515" height="290" frameborder="0" marginwidth="0" marginheight="0" scrolling="no"></iframe></p>
]]></content:encoded>
				
				
							</item>
					<item>
				<guid isPermaLink="false">692aaf4a271bdbb39a8c182c80f26add</guid>
				<title>GyziieDK replied to the topic BuddyPress Global Search Vulnerability issue in the forum How-to &#038; Troubleshooting</title>
				<link>https://buddypress.org/support/topic/buddypress-global-search-vulnerability-issue/#post-335390</link>
				<pubDate>Thu, 24 Oct 2024 07:32:45 +0000</pubDate>

									<content:encoded><![CDATA[<p><a href="https://buddypress.org/members/varunkamani/" rel="nofollow ugc">@varunkamani</a> it&#8217;s not that simple.</p>
<p>The vulnerability issue in this case is <strong>Cross Site Scripting (XSS)</strong>.</p>
<p>This could allow a malicious actor to inject malicious scripts, such as redirects, advertisements, and other HTML payloads into your website which will be executed when guests visit your site.</p>
<p>It is a known risk in general to use outdated and&hellip;<span class="activity-read-more" id="activity-read-more-3673604"><a href="https://buddypress.org/support/topic/buddypress-global-search-vulnerability-issue/#post-335390" rel="nofollow ugc">[Read more]</a></span></p>
]]></content:encoded>
				
				
							</item>
		
	</channel>
</rss>