Title: base 64 eval hack
Last modified: August 21, 2016

---

# base 64 eval hack

 *  [dadadmin](https://wordpress.org/support/users/dadadmin/)
 * (@dadadmin)
 * [12 years, 9 months ago](https://wordpress.org/support/topic/base-64-eval-hack/)
 * I have the following line in my .htaccess file and WP Better security installed,
   but I still got a base 64 eval hack in my index.php file.
 * RewriteCond %{QUERY_STRING} base64_encode.*\(.*\) [NC,OR]
 * Majority of my WP settings are Green with a few of them blue.
 * Is there something else I should be doing to prevent this hack
 * [http://wordpress.org/plugins/better-wp-security/](http://wordpress.org/plugins/better-wp-security/)

The topic ‘base 64 eval hack’ is closed to new replies.

 * ![](https://ps.w.org/better-wp-security/assets/icon.svg?rev=3529351)
 * [Kadence Security – Password, Two Factor Authentication, and Brute Force Protection](https://wordpress.org/plugins/better-wp-security/)
 * [Frequently Asked Questions](https://wordpress.org/plugins/better-wp-security/#faq)
 * [Support Threads](https://wordpress.org/support/plugin/better-wp-security/)
 * [Active Topics](https://wordpress.org/support/plugin/better-wp-security/active/)
 * [Unresolved Topics](https://wordpress.org/support/plugin/better-wp-security/unresolved/)
 * [Reviews](https://wordpress.org/support/plugin/better-wp-security/reviews/)

 * 0 replies
 * 1 participant
 * Last reply from: [dadadmin](https://wordpress.org/support/users/dadadmin/)
 * Last activity: [12 years, 9 months ago](https://wordpress.org/support/topic/base-64-eval-hack/)
 * Status: not resolved