• Resolved ucallrt

    (@ucallrt)


    I’m getting messages from Wordfence that it is finding malicious code in WPO’s cache files:

    Filename: wp-content/cache/wpo-cache/www.bikeworldnews.com/tag/italy/page/2/index.html
    File Type: Not a core, theme, or plugin file from www.remarpro.com.
    Details: This file appears to be installed or modified by a hacker to perform malicious activity. If you know about this file you can choose to ignore it to exclude it from future scans. The matched text in this file is: <!DOCTYPE html>\x0a<html class=”no-js mh-one-sb” lang=”en-US”>\x0a<head>\x0a<meta charset=”UTF-8″>\x0a<meta name=”viewport” content=”width=device-width, initial-scale=1.0″>\x0a<link rel=”profile” href=”https://gmpg&#8230;.

    The issue type is: Spam:HTML/jerseys.B.7204
    Description: Pattern commonly seen in spam infections

    It is not finding these issues in the non-cached pages. I can clean up these files, but they keep re-appearing.

    Sucuri is not finding issues with the site either.

Viewing 1 replies (of 1 total)
  • Hi,

    The code you’re sharing doesn’t seem to contain anything wrong or malicious.

    FYI the cached files contain whatever is generated by WordPress. So if a cached file contains malicious code, it was added somewhere else. WP-Optimize just saves the output to deliver it faster.

    I can clean up these files, but they keep re-appearing

    Yes, the cache is regenerated after being deleted.

    Kind regards,

    Marc.

Viewing 1 replies (of 1 total)
  • The topic ‘Spam infections in WP Optimize cache files’ is closed to new replies.