Critical code_pattern
Resolved · false_positive_documented_feature
2026-04-30 15:25:30 (2d ago)
| Slug | wise-chat |
|---|---|
| Pattern | direct_mysqli_connect |
| Kind | builtin |
| Version | 3.4 |
| Hit count | 1 |
| First hit |
|
| Explanation | plugin instantiates `new mysqli($var['host'], ...)` — a direct MySQL connection bypassing `$wpdb`. Legitimate WordPress plugins always go through `$wpdb` (which already has the connection); a raw `mysqli` connect using parsed wp-config credentials is the credential-harvesting backdoor shape. |
View raw JSON
{
"slug": "wise-chat",
"pattern": "direct_mysqli_connect",
"kind": "builtin",
"version": "3.4",
"hit_count": 1,
"first_hit": {
"file": "src/Endpoints/Ultra/index.php",
"line": 70,
"snippet": "$dbWC = new mysqli($constants['DB_HOST'], $constants['DB_USER'], $constants['DB_PASSWORD'], $constants['DB_NAME']);"
},
"explanation": "plugin instantiates `new mysqli($var['host'], ...)` \u2014 a direct MySQL connection bypassing `$wpdb`. Legitimate WordPress plugins always go through `$wpdb` (which already has the connection); a raw `mysqli` connect using parsed wp-config credentials is the credential-harvesting backdoor shape."
}