• Resolved ferglamanta

    (@ferglamanta)


    I just got this from a wordfence scan, did you made this changes or should I delete the file?
    This file may contain malicious executable code: /home/content/p3pnexwpnas07_data03/66/2553566/html/wp-content/themes/evolve/library/admin/redux-extensions/extensions/vendor_support/vendor/ace_editor/mode-php.js

    Filename: wp-content/themes/evolve/library/admin/redux-extensions/extensions/vendor_support/vendor/ace_editor/mode-php.js
    File type: Not a core, theme or plugin file.
    Issue first detected: 27 mins ago.
    Severity: Critical
    Status New

    This file is a PHP executable file and contains an eval() function and base64() decoding function on the same line. This is a common technique used by hackers to hide and execute code. If you know about this file you can choose to ignore it to exclude it from future scans.

    Please help. Thank you.

Viewing 5 replies - 1 through 5 (of 5 total)
Viewing 5 replies - 1 through 5 (of 5 total)
  • The topic ‘Possibly malisius executable code?’ is closed to new replies.