This topic has 2 replies, 2 voices, and was last updated 9 years by catholicauthor.

  • Author
  • #62997
     catholicauthor
    Participant

    Hi friends, a Wordfence scan just pulled this up and I wanted to double check. It may be just being overzealous.

    http://gyazo.com/fbe82b87d16c7bca5cb66d6e17a441f9

    This file may contain malicious executable code: wp-content/themes/kleo/kleo-framework/options/inc/fields/ace_editor/vendor/mode-php.js
    Filename: wp-content/themes/kleo/kleo-framework/options/inc/fields/ace_editor/vendor/mode-php.js
    File type: Not a core, theme or plugin file.
    Issue first detected: 52 secs ago.
    Severity: Critical
    Status New
    This file is a PHP executable file and contains an eval() function and base64() decoding function on the same line. This is a common technique used by hackers to hide and execute code. If you know about this file you can choose to ignore it to exclude it from future scans.

    #63002
     sharmstr
    Moderator

    I think you’re good. http://themeforest.net/item/cardinal-wordpress-theme/8070889/comments?page=18&filter=all#comment_7647713

    Hi there!!! Help others from the community and mark any reply as solution if it solved your question. Mark as a solution

    This support site is not about custom work. If you need custom development please contact cornel@seventhqueen.com

    #63004
     catholicauthor
    Participant

    Thanks! I’ll ignore it.

Viewing 3 posts - 1 through 3 (of 3 total)

The forum ‘Plugins questions’ is closed to new topics and replies.

Log in with your credentials

Forgot your details?