We're Moving to a New Support Platform – Starting June 1st!
We’re excited to let you know that starting June 1st, we’ll be transitioning to a new support system that will be available directly on our product websites – Amelia, wpDataTables, and Report Builder. In fact, the new support platform is already live for Amelia and wpDataTables, and we encourage you to reach out to us there.
You'll always be able to reach us through a widget in the bottom right corner of each website, where you can ask questions, report issues, or simply get assistance.
While we still do not offer live support, a new advanced, AI-powered assistant, trained on our documentation, use cases, and real conversations with our team, is there to help with basic to intermediate questions in no time.
We're doing our best to make this transition smooth and hassle-free. After June 1st, this current support website will redirect you to the new "Contact Us" pages on our product sites.
Thanks for your continued support and trust – we’re excited to bring you an even better support experience!
2 of your PHP files have this vulnerability: https://www.wordfence.com/threat-intel/vulnerabilities/detail/various-plugins-various-version-use-of-polyfillio
1. Filename: .../public_html/wp-content/plugins/ameliabooking/src/Infrastructure/WP/WPMenu/SubmenuPageHandler.php
2. Filename: .../public_html/wp-content/plugins/ameliabooking/src/Infrastructure/WP/ShortcodeService/AmeliaShortcodeService.php
Is Amelia working to replace the Polyfill JS library in a patch or doing anything else about this?
Thanks!
Hello,
Thank you for raising this concern regarding the vulnerability related to the Polyfill JS library in the mentioned files. We want to assure you that we have already addressed this issue in our recent updates. The problematic URL has been removed, and the necessary changes have been implemented to resolve the vulnerability.
Additionally, we are actively working with the Wordfence plugin team to ensure that this vulnerability is officially cleared from their domain blocklist. We expect that once their team has reviewed the changes, the vulnerability display will be removed in future scans.
Please rest assured that we are taking every measure to maintain the highest level of security for our plugin. If you have any further questions or need additional assistance, feel free to reach out. We appreciate your continued patience and understanding!
Kind Regards,
Uros Jovanovic
[email protected]
Rate my support
Try our FREE mapping plugin! MapSVG - easy Google maps, interactive SVG maps, and floor plans, choropleth maps and much more - https://wordpress.org/plugins/mapsvg-lite-interactive-vector-maps/
wpDataTables: FAQ | Facebook | Twitter | Instagram | Front-end and back-end demo | Docs
Amelia: FAQ | Facebook | Twitter | Instagram | Amelia demo sites | Docs | Discord Community
You can try wpDataTables add-ons before purchasing on these sandbox sites:
Powerful Filters | Gravity Forms Integration for wpDataTables | Formidable Forms Integration for wpDataTables | Master-Detail Tables
Sorry for late reply. We can confirm that this issue has been fixed in Amelia v7.8. Thank you for a quick response and resolution!