WordFence Plugin saying Sendy files are possibly infected
-
If anyone here is using Sendy (https://sendy.co/), could you please do a site scan. Make sure that your WordFence settings include “Scan files outside your WordPress installation” – then save and run your scan. Please let me know if you’re getting the same warnings.
WordFence is reporting the following 3 files are possibly infected or malicious:
==========================================================
File appears to be malicious: sendy/_install.php
Filename: sendy/_install.php
File type: Not a core, theme or plugin file.
Issue first detected: 3 mins ago.
Severity: Critical
Status New
This file appears to be installed by a hacker to perform malicious activity. If you know about this file you can choose to ignore it to exclude it from future scans. The text we found in this file that matches a known malicious file is: “${“\x47LO\x42A\x4c\x53”}[“. The infection type is: f649 infectionFile appears to be malicious: sendy/includes/functions.php
Filename: sendy/includes/functions.php
File type: Not a core, theme or plugin file.
Issue first detected: 3 mins ago.
Severity: Critical
Status New
This file appears to be installed by a hacker to perform malicious activity. If you know about this file you can choose to ignore it to exclude it from future scans. The text we found in this file that matches a known malicious file is: “${“\x47L\x4f\x42\x41LS”}[“. The infection type is: f649 infectionFile appears to be malicious: sendy/js/ckeditor/plugins/codemirror/js/codemirror.mode.php.min.js
Filename: sendy/js/ckeditor/plugins/codemirror/js/codemirror.mode.php.min.js
File type: Not a core, theme or plugin file.
Issue first detected: 3 mins ago.
Severity: Critical
Status New
This file appears to be installed by a hacker to perform malicious activity. If you know about this file you can choose to ignore it to exclude it from future scans. The text we found in this file that matches a known malicious file is: “eval include include_once isset list require require_once return print unset __halt_compiler self static parent yield insteadof finally”;var i=”true false null TRUE FALSE NULL __CLASS__ __DIR__ __FILE…”. The infection type is: Suspicious eval with base64 decode.
- The topic ‘WordFence Plugin saying Sendy files are possibly infected’ is closed to new replies.