Hi friends, a Wordfence scan just pulled this up and I wanted to double check. It may be just being overzealous.
http://gyazo.com/fbe82b87d16c7bca5cb66d6e17a441f9
This file may contain malicious executable code: wp-content/themes/kleo/kleo-framework/options/inc/fields/ace_editor/vendor/mode-php.js
Filename: wp-content/themes/kleo/kleo-framework/options/inc/fields/ace_editor/vendor/mode-php.js
File type: Not a core, theme or plugin file.
Issue first detected: 52 secs ago.
Severity: Critical
Status New
This file is a PHP executable file and contains an eval() function and base64() decoding function on the same line. This is a common technique used by hackers to hide and execute code. If you know about this file you can choose to ignore it to exclude it from future scans.