wp-emoji-release.min.js
-
I have an issue where someone is injecting code into the WordPress file wp-emoji-release.min.js.
Wordfence catches the file change, but it does not come up as malicious code in other scans, such as my host’s scan, Jetpack, or even Google.
In its behaviour, it tries to be stealthy. When a person clicks an internal link, they are also treated to a popup page. However, it looks to only occur once, or at least only once in a given timeframe. It also does not occur with logged-in users.
However the code injection is happening, they are getting around both Wordfence and Cloudflare.
Are there any suggestions of how to stop this from occurring? Are you aware of some vulnerability?
- The topic ‘wp-emoji-release.min.js’ is closed to new replies.