Forum Replies Created

Viewing 8 replies - 1 through 8 (of 8 total)
  • I searched it and it displayed your website just fine. What is the URL that displays the bluehost screen?

    What you’re seeing is an unfiltered post. Usually the content of the post is passed through the_content filter and those shortcodes are replaced.

    Maybe it’s a caching issue (you could try to disable the cache). It could also be that your search result template is using an echo $post->post_content; instead of calling the_content().

    Check with the developers of your theme.

    • This reply was modified 6 years, 10 months ago by birre.

    Just a sanity check: Have you selected the child-theme to be used under Appearance > themes?

    I guess you mean that there are no .html files with WordPress to copy. And that is true, the PHP files are programming that allow you to create and modify pages in the database. Without that database, WordPress won’t function and no page content is available. If you deleted the database, that would be the end of all your content and settings if no backup is available.

    You could hope Installatron was installed, then you could look in \application_backups (in the root) of your hosting account. If that contains .tar.gz files, that would be a backup, usually when it does an update.

    Recreating the website from scratch is the only option if no have no backups.

    Good luck!

    Thread Starter birre

    (@birre)

    Hello there,

    Thank you very much. I saw the update, I’ve updated our (staging) website and it’s working good now in IE11. I’d like to commend you on a very speedy fix! Thank you!

    birre

    (@birre)

    Yes, this happens with my mails as well. Multiple downloads are lower case.

    Note: I do have Have Flamingo and WP mail SMTP

    Thread Starter birre

    (@birre)

    I have close to 50 sites under my care. The hack happened almost 2 month ago. These three websites were hacked into had ONLY this plugin in common.

    One compromised website was on a previous WordPress versions (one was on the 4.4 branch and two on the latest 4.5 branch). All three websites were updated to the latest security update automatically. One site had auto-update for everything (latest WP major version, security updates, themes and plugins). The websites had no themes or other plugins in common. The hacked sites had the same backdoor plugins installed after being hacked.

    Upon close inspection:
    – ucOptions.php allows direct access and manipulation of POST variables to write options without authorization, ATM, only POST & user access is filtered, I can still turn the under construction page on or off through [GET].
    – Other .php files allow direct access too.
    – Only some of the user supplied arguments are being sanitized.
    I think there are more holes as the attacker was able to add new admin user accounts without me getting the notification.

    I’ve cleaned these sites completely, new install, hashes, passwords and updated these sites with more security than the default plugin “limit login attempts”. Needless to say, this plugin isn’t going to be installed ever again.

    Thread Starter birre

    (@birre)

    Great! Thanks for the quick response.

Viewing 8 replies - 1 through 8 (of 8 total)