function index() { if (!current_user_can($this->_access_level)) { die(__('Cheatin’ uh?')); } // This needs to be modified to not allow an attacker to bypass it. // Possibly do a check to see if $_POST is not empty. if (!empty($_REQUEST['_wpnonce'])) { ITForm::check_nonce(!empty($this->_nonce) ? $this->_nonce : null); } ITUtility::cleanup_request_vars(); }