Drag and Drop Multiple File Upload – Contact Form 7 - Version 1.3.3.3.2

Version Description

  • Bugs - Fixed unable to submit form ( 500 Internal Server Error in response )
Download this release

Release Info

Developer glenwpcoder
Plugin Icon 128x128 Drag and Drop Multiple File Upload – Contact Form 7
Version 1.3.3.3.2
Comparing to
See all releases

Code changes from version 1.3.3.3.1 to 1.3.3.3.2

drag-n-drop-upload-cf7.php CHANGED
@@ -6,7 +6,7 @@
6
  * Description: This simple plugin create Drag & Drop or choose Multiple File upload in your Confact Form 7 Forms.
7
  * Text Domain: dnd-upload-cf7
8
  * Domain Path: /languages
9
- * Version: 1.3.3.3.1
10
  * Author: Glen Don L. Mongaya
11
  * Author URI: http://codedropz.com
12
  * License: GPL2
@@ -21,7 +21,7 @@
21
  define( 'dnd_upload_cf7', true );
22
 
23
  /** Define plugin Version */
24
- define( 'dnd_upload_cf7_version', '1.3.3.3.1' );
25
 
26
  /** Define constant Plugin Directories */
27
  define( 'dnd_upload_cf7_directory', untrailingslashit( dirname( __FILE__ ) ) );
6
  * Description: This simple plugin create Drag & Drop or choose Multiple File upload in your Confact Form 7 Forms.
7
  * Text Domain: dnd-upload-cf7
8
  * Domain Path: /languages
9
+ * Version: 1.3.3.3.2
10
  * Author: Glen Don L. Mongaya
11
  * Author URI: http://codedropz.com
12
  * License: GPL2
21
  define( 'dnd_upload_cf7', true );
22
 
23
  /** Define plugin Version */
24
+ define( 'dnd_upload_cf7_version', '1.3.3.3.2' );
25
 
26
  /** Define constant Plugin Directories */
27
  define( 'dnd_upload_cf7_directory', untrailingslashit( dirname( __FILE__ ) ) );
inc/dnd-upload-cf7.php CHANGED
@@ -416,7 +416,7 @@
416
  $multiple_files = ( ( isset( $_POST[ $name ] ) && count( $_POST[ $name ] ) > 0 ) ? sanitize_text_field( $_POST[ $name ] ) : null );
417
 
418
  // Cf7 Conditional Field
419
- if ( is_plugin_active( 'cf7-conditional-fields/contact-form-7-conditional-fields.php' ) ) {
420
  $hidden_groups = json_decode( stripslashes( $_POST['_wpcf7cf_hidden_groups'] ) );
421
  if( $tag->is_required() && ! in_array( $name, $hidden_groups ) && is_null( $multiple_files ) ) {
422
  $result->invalidate( $tag, wpcf7_get_message( 'invalid_required' ) );
416
  $multiple_files = ( ( isset( $_POST[ $name ] ) && count( $_POST[ $name ] ) > 0 ) ? sanitize_text_field( $_POST[ $name ] ) : null );
417
 
418
  // Cf7 Conditional Field
419
+ if( in_array('cf7-conditional-fields/contact-form-7-conditional-fields.php', get_option('active_plugins') ) ){
420
  $hidden_groups = json_decode( stripslashes( $_POST['_wpcf7cf_hidden_groups'] ) );
421
  if( $tag->is_required() && ! in_array( $name, $hidden_groups ) && is_null( $multiple_files ) ) {
422
  $result->invalidate( $tag, wpcf7_get_message( 'invalid_required' ) );
readme.txt CHANGED
@@ -3,7 +3,7 @@ Donate link : http://codedropz.com/donation
3
  Tags: drag and drop, contact form 7, ajax uploader, multiple file, upload, contact form 7 uploader
4
  Requires at least: 3.0.1
5
  Tested up to: 5.4.1
6
- Stable tag: 1.3.3.3.1
7
  Requires PHP: 5.2.4
8
  License: GPLv2 or later
9
  License URI: https://www.gnu.org/licenses/gpl-2.0.html
@@ -124,6 +124,12 @@ To install this plugin see below:
124
 
125
  == Changelog ==
126
 
 
 
 
 
 
 
127
  = 1.3.3.3 =
128
  * Fixed - Security Issues ( Unrestricted File Upload to Remote Code Execution - Thanks to @Austin )
129
  - Able bypass and upload file (remotely) by renaming to ie: shell.php% and modified supported_type to `jpg|png|php%`
3
  Tags: drag and drop, contact form 7, ajax uploader, multiple file, upload, contact form 7 uploader
4
  Requires at least: 3.0.1
5
  Tested up to: 5.4.1
6
+ Stable tag: 1.3.3.3.2
7
  Requires PHP: 5.2.4
8
  License: GPLv2 or later
9
  License URI: https://www.gnu.org/licenses/gpl-2.0.html
124
 
125
  == Changelog ==
126
 
127
+ = 1.3.3.3.2 =
128
+ * Bugs - Fixed unable to submit form ( 500 Internal Server Error in response )
129
+
130
+ = 1.3.3.3.1 =
131
+ * Fixes - Minor updates (packed the wrong file)
132
+
133
  = 1.3.3.3 =
134
  * Fixed - Security Issues ( Unrestricted File Upload to Remote Code Execution - Thanks to @Austin )
135
  - Able bypass and upload file (remotely) by renaming to ie: shell.php% and modified supported_type to `jpg|png|php%`