Gravity Forms 1.9.4

Gravity Forms was updated to version 1.9.4, from version 1.9.3. Changelog:

  • Added 2 new ready classes: gf_simple_horizontal and gf_section_right.
  • Added logging for $phpmailer->ErrorInfo.
  • Updated the Number field to include the thousands separator when returning a validation failure if the input type is ‘text’. Some browsers do not allow commas when using the HTML5 ‘number’ input type.
  • Updated number formatting to include the thousands separator on the entry list and detail pages and when merge tags are processed. The :value modifier will return the value without the thousand separator.
  • Fixed security issue in the import process of legacy forms on some systems.
  • Fixed an issue with GFCommon::format_number using the currency defined on the Forms > Settings page instead of the currency used with the entry which resulted in the number being incorrectly formatted when using the third-party Gravity Forms Multi Currency add-on.
  • Fixed an issue with conditional logic not updating the enhanced UI after resetting the value of the underlying select element.
  • Fixed a security vulnerability in the admin area that could be exploited by users with permission to edit forms in the WordPress Dashboard which is admin only by default.
  • Fixed a security vulnerability for forms that require login. Caching pages with forms that require login will now cause submissions to fail.
  • Fixed a JavaScript error on the edit page for some custom post types that don’t have an editor.
  • Fixed issue with chosen sprite file name. Renamed it to prevent issues on some server configurations.
  • Fixed calculations in the the post custom field when when the input type is set to number and calculations are enabled.
  • Fixed an issue with the ID attributes of the left span elements of Email and Password fields.
  • Fixed an issue with the field label for attribute in the form editor containing an extra underscore.
  • Updated logging in GFPaymentAddOn.
  • Fixed an issue that could potentially pose a security vulnerability via third-party add-ons and custom code.
  • Fixed a warning generated in the results endpoint when there are no entries.