<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="bbPress/1.0.1" -->
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>Gravity Support Forums Topic: captcha executable files</title>
		<link>https://legacy.forums.gravityhelp.com/topic/captcha-executable-files</link>
		<description>Gravity Support Forums Topic: captcha executable files</description>
		<language>en-US</language>
		<pubDate>Thu, 23 Apr 2026 12:41:16 +0000</pubDate>
		<generator>http://bbpress.org/?v=1.0.1</generator>
		<textInput>
			<title><![CDATA[Search]]></title>
			<description><![CDATA[Search all topics from these forums.]]></description>
			<name>q</name>
			<link>https://legacy.forums.gravityhelp.com/search.php</link>
		</textInput>
		<atom:link href="https://legacy.forums.gravityhelp.com/rss/topic/captcha-executable-files" rel="self" type="application/rss+xml" />

		<item>
			<title>Chris Hajer on "captcha executable files"</title>
			<link>https://legacy.forums.gravityhelp.com/topic/captcha-executable-files#post-30610</link>
			<pubDate>Wed, 20 Jul 2011 23:44:17 +0000</pubDate>
			<dc:creator>Chris Hajer</dc:creator>
			<guid isPermaLink="false">30610@https://legacy.forums.gravityhelp.com/</guid>
			<description>&#60;p&#62;@tanksalot, regarding filed being &#34;executable&#34; they might be referring to file permissions.  Static files like JavaScript, CSS, php, images, etc (most anything in the WordPress folder EXCEPT directories) can be set to 644 permissions.  If any of those files have 755 or 777 permissions, then they have the executable bit set, and maybe that's what they're running into and warning you of.  It's not necessary to have PHP files or images marked executable (permissions of 7 for user, group or everyone.)&#60;/p&#62;
&#60;p&#62;There are a couple ways to fix it, but it depends on what sort of access you have to your host (command line, FTP, etc.)&#60;/p&#62;
&#60;p&#62;If you're on a Linux host and have command line access, you can do something like this inside your WordPress directory:&#60;/p&#62;
&#60;p&#62;&#60;code&#62;find . -type f &#124; while read f; do chmod -v -x &#38;quot;$f&#38;quot;; done&#60;/code&#62;&#60;/p&#62;
&#60;p&#62;That will find all files in the current directory and all subdirectories, then chmod those files to remove the executable bit.    Good luck.
&#60;/p&#62;</description>
		</item>
		<item>
			<title>Carl Hancock on "captcha executable files"</title>
			<link>https://legacy.forums.gravityhelp.com/topic/captcha-executable-files#post-30448</link>
			<pubDate>Tue, 19 Jul 2011 15:55:23 +0000</pubDate>
			<dc:creator>Carl Hancock</dc:creator>
			<guid isPermaLink="false">30448@https://legacy.forums.gravityhelp.com/</guid>
			<description>&#60;p&#62;A blank index.php is not an executable.  It's used to prevent people from browsing directories if they are snooping around and your file permissions aren't set properly to prevent file browsing.  It's a safety measure.&#60;/p&#62;
&#60;p&#62;100 images isn't unusual. They are small files and depending on your Captcha setup multiple images are used to display a single Captcha.  Make sure the file permissions on that folder are set to something like CHMOD 755 or 777.  You can manually delete the images in that directory if you are worried about it.  Gravity Forms only cleans up as needed.
&#60;/p&#62;</description>
		</item>
		<item>
			<title>tanksalot on "captcha executable files"</title>
			<link>https://legacy.forums.gravityhelp.com/topic/captcha-executable-files#post-30444</link>
			<pubDate>Tue, 19 Jul 2011 15:48:15 +0000</pubDate>
			<dc:creator>tanksalot</dc:creator>
			<guid isPermaLink="false">30444@https://legacy.forums.gravityhelp.com/</guid>
			<description>&#60;p&#62;Hi Carl,&#60;/p&#62;
&#60;p&#62;Perhaps they are being overly-agressive about this. I'm getting a report that a blank index.php is an executable too. Thoughts?&#60;/p&#62;
&#60;p&#62;You mention that GF cleans up temporary files. Are they supposed to temporary? I've got about 100 pair of images (png) and matching php in the wp-content/uploads/gravity_forms/captcha Might I have to adjust the directories permissions or turn on something to make this happen. We've only had a handful of submissions so far.
&#60;/p&#62;</description>
		</item>
		<item>
			<title>Carl Hancock on "captcha executable files"</title>
			<link>https://legacy.forums.gravityhelp.com/topic/captcha-executable-files#post-30424</link>
			<pubDate>Tue, 19 Jul 2011 14:57:19 +0000</pubDate>
			<dc:creator>Carl Hancock</dc:creator>
			<guid isPermaLink="false">30424@https://legacy.forums.gravityhelp.com/</guid>
			<description>&#60;p&#62;Gravity Forms cleans up temporary files such as images generated by the Really Simple Captcha automatically. The reCAPTCHA field doesn't generate static images, it calls them from the reCAPTCHA service.  I don't know what executables you are referring to, Gravity Forms is a PHP based application which is a scripting language and not an executable.  It consists entirely of PHP, Javascript, CSS and Images.
&#60;/p&#62;</description>
		</item>
		<item>
			<title>tanksalot on "captcha executable files"</title>
			<link>https://legacy.forums.gravityhelp.com/topic/captcha-executable-files#post-30417</link>
			<pubDate>Tue, 19 Jul 2011 13:06:57 +0000</pubDate>
			<dc:creator>tanksalot</dc:creator>
			<guid isPermaLink="false">30417@https://legacy.forums.gravityhelp.com/</guid>
			<description>&#60;p&#62;I have a security group scanning my site and they are reporting that in the GF directory there are executable files and that I should be concerned. When I look, I find .php and .png files created and/or used by the captcha. The png are the different captcha images. The php must be used for something important, but they are the ones the security scan does not like.&#60;/p&#62;
&#60;p&#62;OK, the first thing that popped into my head was, &#34;If these are being created every time someone submits a form this is going to be one big directory.&#34; Do these ever get purged? How do we keep control of how big the directory gets? Lastly, are there any security issues with having them in there?
&#60;/p&#62;</description>
		</item>

	</channel>
</rss>
