Checkout Malicious Code Injection
-
WE have WC 4.1.2 and added the patch after the security issues has been identified last year. Currently we have been attack by adding a JS code inside our form-checkout.php inside the theme folder and vars.php in the wp-ncludes folder, this code disabled the Proceed to Checkout button and redirects the user to a malicious HMTL page, what we did was create a function that detects the file’s updated date and replace it with the backup fomr-checkout.php to remove the malicious code automatically. this is ran every 5mins using cron job. Updating the plugin is not in the options since we have custom function that is not tested in the latest version of WC. Does anyone have longterm solution or have experienced this?
ThanksThe page I need help with: [log in to see the link]
- The topic ‘Checkout Malicious Code Injection’ is closed to new replies.