Malicious code detected from Wordfence
-
Hi,
The Wordfence scan has triggued some critical errors indicating malicious code coming only from your plugin.
Example:
File appears to be malicious or unsafe: xxx/miniorange-saml-20-single-sign-on/LogoutRequest.php
Type: FileFilename: xxx/miniorange-saml-20-single-sign-on/LogoutRequest.php
File Type: Not a core, theme, or plugin file from www.remarpro.com.
Details: This file appears to be installed or modified by a hacker to perform malicious activity. If you know about this file you can choose to ignore it to exclude it from future scans. The matched text in this file is: include_once “\125\x74\151The issue type is: Backdoor:PHP/ObfuscatedInclude.6067
Description: PHP include() statement with an obfuscated filepath.Inspecting these files, I see a lot of strings with values such as “\x4d\151\x73\x73\151\156\147\40\x49\x44\40\x61\164\x74\162\151\142\x75\x74\x65\40\x6f\x6e\x20\x53\x41\115\x4c\x20\155\x65\x73\x73\141\x67\x65\56”
We are running miniOrange SSO using SAML 2.0, premium single site, Version 11.4.0.
I read in a previous thread that “the premium plugin, the code that is deployed on your WordPress instance is protected.The tool that you are using to scan such plugins is primitive. It’s unable to distinguish between a malicious obfuscated code and our premium code which is for a valid reason.”
Can you confirm if this is malicious code and a security threat that I should handle or if these are false positive thrown by Wordfence from your plugin’s “premium protected code”?
- The topic ‘Malicious code detected from Wordfence’ is closed to new replies.