Thanks for the explanation. I use Wordfence for scanning.
So this is a .php meta-file(wp-content/cache/supercache/www.example.org/meta-wp-cache-www.example.org12ef834fsaf32r23f43gsdf95.php) that can’t execute any code – because of <?php die(); ?>
in the first lane and hashed filename, and it contains JSON-encoded information about the request.
The malicious code that was found in this file is just a request saved in JSON – so the website was not compromised(these files were not edited by 3-rd party) and the code can’t be used.
-
This reply was modified 4 years, 9 months ago by al2357.