Hi Steven,
I have finally returned with an update from my host:
The developer is correct. I noticed that the file
“class.filesystem.php” is being quarantined by the Anti-Virus (CXS)
installed on the server.I have not added this file in the ignore list, I am afraid. The reason
behind this is, if the file is exploited then it can cause issues to
the server. Following code is used to delete file recursively.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ if ( $file->isDir()
) {@rmdir( $file->getPathname() );
} else {
@unlink( $file->getPathname() );
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~While the code is well written, being a WordPress site hacker can try
to exploit it. Considering this if you permit, I can go ahead and add
this file to the whitelist.
Is there anything that can be done to address this at your end? Or do you think there is nothing to worry about if I give permission to whitelist the file at a server level?
Thanks!