Lightspeed critical escalation vulnerability
-
Hi,
after reciving your e-mail today i looked at the installation.
The Lightspeed plugin contents a folder named: Thirdparty
There a files that are updated 5:13 German time yesterday:
- aelia-currencyswitcher.cls.php
- amp.cls.php
- avada.cls.php
- bbpress.cls.php and many other php files.
In folder Lightspeed-cache/data/ is a file named advanced.data including code like
[“_version”, “5.3”] [“guest”, true] and other for me suspicious looking codes.
Is this hacked or what can / should i do?
Best regards
guckmada
The page I need help with: [log in to see the link]
Viewing 2 replies - 1 through 2 (of 2 total)
Viewing 2 replies - 1 through 2 (of 2 total)
- You must be logged in to reply to this topic.