What malicious actions can be made with a “search and replace” in a WP database?
-
I was that stupid to neglect the importance of removing searchreplacedb2.php immediately after usage, that way I forgot it where I placed it. As a result, it has been recently found and exploited.
So far I could easily get rid of some code added in the posts table.
<script src=’https://xxxxxxxxxxxxxxxx’ type=’text/javascript’></script>
That produced redirections.
My knowledge about the other WP tables is limited for the moment, so I cannot yet tell for sure what else could have been done elsewhere in the database with a “search and replace”. I hope somebody will tell me that before I figure it out on my own, since it may possibly require a long time.
Thanks in advance!
- The topic ‘What malicious actions can be made with a “search and replace” in a WP database?’ is closed to new replies.