• Resolved tom coady

    (@tomcoady)


    I have received the following warning from my web host:

    We have identified attacker-added malicious content, which may include
    malware such as backdoor shells, adware, botnet, and spammer scripts.

    The following file(s) specifically have been identified as attacker-added
    malware. These files have been DISABLED by setting their permissions to 200
    (Owner write-only). These files should be audited and either replaced with
    known good versions or, if not legitimate site components, removed altogether:

    /wp-content/wflogs/config.php

    but WordFence can’t see any problems!

    https://wordpress.org/plugins/wordfence/

Viewing 2 replies - 1 through 2 (of 2 total)
  • Hello tom!
    Wordfence doesn’t see any problems because that’s Wordfences own file. 🙂 I’m not sure what software they are using to detect. Could you ask them please which software they used that detected this so that we can have a look at what’s up with it. I’m fairly certain it’s whats called a “false positive”, i.e. something that gets flagged by accident. If possible it would also be great if you could download that file from your account using FTP or SSH and send it as an attachment samples@wordfence.com and include a reference to this forum post. Thanks in advance!

    Thread Starter tom coady

    (@tomcoady)

    Thank you for your prompt reply, I appreciate your diligence and protection 🙂

Viewing 2 replies - 1 through 2 (of 2 total)
  • The topic ‘wflogs/config.php flagged as malicious’ is closed to new replies.