Forum Replies Created
-
AuthorPosts
-
January 21, 2019 at 5:30 pm in reply to: Default theme pages best practice to remove or make private? #1056821
Thanks,
Is there a formal list of the initial pages?
Dave,
Hello,
I wonder if you are having the same issue I am with the same symptoms.
If in Chrome you open the Inspector (Right click and select inspect) – watch the Network tab while you reload the editor page.
Do you see a few errors (HTTP 406) with connections to /wp-admin/admin-ajax.php.
Under those errors if you click on them and go to the Response tab is Mod Security referenced?
Hello,
I think we are experiencing the same issue. Do you concur?
The Avia Layout Builder will show a spinning indicator in the Editor.
I have troubleshoot this to a Mod_security error on queries to the /wp-admin/admin-ajax.php
Are you seeing some of the network request on the edit page getting blocked with a HTTP 406 error code?
The rule being triggered is:
ModSecurity: Access denied with code 406 (phase 2). Pattern match “\\\\b(?:(?:s(?:ys(?:(?:(?:process|tabl)e|filegroup|object)s|c(?:o(?:nstraint|lumn)s|at)|dba|ibm)|ubstr(?:ing)?)|user_(?:(?:(?:constrain|objec)t|tab(?:_column|le)|ind_column|user)s|password|group)|a(?:tt(?:rel|typ)id|ll_objects)|object_(?:(?:nam|typ)e|id) …” at ARGS:text. [file “/usr/local/apache/conf/modsec2.user.conf”] [line “74”] [id “950904”] [msg “Blind SQL Injection Attack”] [data “substr”] [severity “CRITICAL”] [tag “WEB_ATTACK/SQL_INJECTION”] [hostname “SERVERNAME_HERE”] [uri “/wp-admin/admin-ajax.php”]
This is a recent issue, have you heard of it.
Our shared web host cannot whitelist this rule for us ;-(
Hello,
I think we are experiencing the same issue. The Avia Layout Builder will show a spinning indicator in the Editor.
I have troubleshoot this to a Mod_security error on the /wp-admin/admin-ajax.php
Are you seeing some of the network request on the edit page getting blocked with a HTTP 406 error code?
The rule being triggered is:
ModSecurity: Access denied with code 406 (phase 2). Pattern match “\\\\b(?:(?:s(?:ys(?:(?:(?:process|tabl)e|filegroup|object)s|c(?:o(?:nstraint|lumn)s|at)|dba|ibm)|ubstr(?:ing)?)|user_(?:(?:(?:constrain|objec)t|tab(?:_column|le)|ind_column|user)s|password|group)|a(?:tt(?:rel|typ)id|ll_objects)|object_(?:(?:nam|typ)e|id) …” at ARGS:text. [file “/usr/local/apache/conf/modsec2.user.conf”] [line “74”] [id “950904”] [msg “Blind SQL Injection Attack”] [data “substr”] [severity “CRITICAL”] [tag “WEB_ATTACK/SQL_INJECTION”] [hostname “SERVERNAME_HERE”] [uri “/wp-admin/admin-ajax.php”]
This is a recent issue, have you heard of it.
Our shared web host cannot whitelist this rule for us ;-(
February 23, 2015 at 8:39 pm in reply to: enfold child theme with events calendar customizations. #400980Hi Josue,
I think it’s an issue with another plugin called Advanced Custom Fields. I’m chasing it down and will be in touch with either a resolution or a need for appropriate assistance.
Thanks,
Cliff
-
AuthorPosts