Fixed changes
- Fixed
pluginCommand
causes type exception.
⚠️ SECURITY WARNING - Please read it ⚠️
I've noticed that some plugins use eval
to handle parameters.
Plugin that uses eval
to parse plugin parameters together with the resource strings feature of this plugin, an attacker can use community localization files to compromise players.
If you have a plugin that allows you to handle formulas in parameters via plugin commands, I recommend avoiding using their commands with resource strings of this plugin if possible.
For more details, please see Arbitrary Code Execution (ACE) vulnerability.