Hello @dragonfly-ca,
Thank you for your detailed response and for bringing this to our attention.
We would like to clarify that there is no security vulnerability in our code. The usage of the X-HTTP-Method-Override
header is quite common and widely accepted in web applications and WordPress plugins that work with REST APIs. This issue appears to be specific to Flywheel, as none of our users on other servers are encountering it.
We recommend enabling the X-HTTP-Method-Override
header specifically for your website at the server level and configuring a Web Application Firewall (WAF) to restrict access to the FluentCRM API endpoints. This approach will help maintain security while addressing Flywheel’s concerns.
Additionally, if possible, we suggest excluding the FluentCRM REST API routes from Flywheel’s caching layer to prevent any potential issues. The routes to consider are:
/wp-json/fluent-crm/v2/subscribers/
, /wp-json/fluent-crm/v2/lists/
, /wp-json/fluent-crm/v2/tags/
,/wp-json/fluent-crm/v2/campaigns/
, /wp-json/fluent-crm/v2/custom-fields/contacts
We appreciate you sharing Flywheel’s response and their contact information. We will reach out to discuss this further.
In the meantime, please consider opening a support ticket with us so we can continue the conversation and address this matter more directly.
Thank you again for your cooperation and understanding.