• Tim

    (@tjalexander70)


    I have an issue where someone is injecting code into the WordPress file wp-emoji-release.min.js.

    Wordfence catches the file change, but it does not come up as malicious code in other scans, such as my host’s scan, Jetpack, or even Google.

    In its behaviour, it tries to be stealthy. When a person clicks an internal link, they are also treated to a popup page. However, it looks to only occur once, or at least only once in a given timeframe. It also does not occur with logged-in users.

    However the code injection is happening, they are getting around both Wordfence and Cloudflare.

    Are there any suggestions of how to stop this from occurring? Are you aware of some vulnerability?

Viewing 3 replies - 16 through 18 (of 18 total)
  • tou com mesmo problema ninguem resolveu

    Hello, I also had the same problem and the solution I found was to add this code in mu-plugins:

    remove_action( ‘wp_head’, ‘print_emoji_detection_script’, 7 );
    remove_action( ‘wp_print_styles’, ‘print_emoji_styles’ );

    Apparently it turned out any news I inform you.
    Sorry my bad english

    *

Viewing 3 replies - 16 through 18 (of 18 total)
  • The topic ‘wp-emoji-release.min.js’ is closed to new replies.