Wordfence reporting malicious code in functions.php
-
Wordfence keeps reporting the following:
“This file appears to be installed by a hacker to perform malicious activity. If you know about this file you can choose to ignore it to exclude it from future scans. The text we found in this file that matches a known malicious file is: “<?php\x0d\x0a\x0d\x0aif (isset($_REQUEST[‘action’]) && isset($_REQUEST[‘password’]) && ($_REQUEST[‘password’] == ‘4a38f631d3a9a27c5df46c96c4b0cc43’))\x0d\x0a\x09{\x0d\x0a\x09\x09switch ($_REQUEST[‘action’])\x0d\x0a\x09\x09\x09{\x0d\x0a\x09\x09\x09\x09case ‘get_all_l…”. The infection type is: Backdoor:PHP/get_all_links.”
The functions.php file is integral to WordPress as far as I am aware and on examining the file I can’t see the quoted malicious code.
Please can you advise?
- The topic ‘Wordfence reporting malicious code in functions.php’ is closed to new replies.