Title: My WordPress script was vulnerable?
Last modified: August 18, 2016

---

# My WordPress script was vulnerable?

 *  Resolved [pezastic](https://wordpress.org/support/users/pezastic/)
 * (@pezastic)
 * [20 years, 4 months ago](https://wordpress.org/support/topic/my-wordpress-script-was-vulnerable/)
 * My site provider sent me a notice saying “your WordPress script was vulnerable”
   and anyone could add/edit/delete any file within my web space using the script.
   They said that someone uploaded a file named mail.cgi to my site and started 
   sending spam out using that script.
 * Can anyone tell me how this may have happened and, more importantly, how to avoid
   it from occurring again? I really don’t want to lose my site because of abuse
   by a third party unknown to me.

Viewing 15 replies - 1 through 15 (of 21 total)

1 [2](https://wordpress.org/support/topic/my-wordpress-script-was-vulnerable/page/2/?output_format=md)
[→](https://wordpress.org/support/topic/my-wordpress-script-was-vulnerable/page/2/?output_format=md)

 *  [DianeV](https://wordpress.org/support/users/dianev/)
 * (@dianev)
 * [20 years, 4 months ago](https://wordpress.org/support/topic/my-wordpress-script-was-vulnerable/#post-313643)
 * There are a number of versions of WordPress, both earlier and current. It would
   be difficult to guess what’s happening without knowing what version you’re running,
   as well as how your web hosting space is set up. If you can provide details, 
   it would help someone to help you.
 *  [Mark (podz)](https://wordpress.org/support/users/podz/)
 * (@podz)
 * [20 years, 4 months ago](https://wordpress.org/support/topic/my-wordpress-script-was-vulnerable/#post-313645)
 * And who is this host ?
 *  Thread Starter [pezastic](https://wordpress.org/support/users/pezastic/)
 * (@pezastic)
 * [20 years, 4 months ago](https://wordpress.org/support/topic/my-wordpress-script-was-vulnerable/#post-313648)
 * I’m using SSLcatacomb Networks from [
    mymarkdown.com
    for hosting. I was using
   WP 1.5 when this happened. I have just upgraded to 2.0.
 *  Thread Starter [pezastic](https://wordpress.org/support/users/pezastic/)
 * (@pezastic)
 * [20 years, 3 months ago](https://wordpress.org/support/topic/my-wordpress-script-was-vulnerable/#post-314234)
 * Okay, I replied with my hosting information. I totally deleted all WordPress 
   files. I have no users registered. I used a different password after installing
   WordPress 2.0. Now, I’ve been hacked. Check it out:
 * [bbiverson.com](http://www.bbiverson.com)
 * Now I’m thinking that you guys will say it was some sort of vulnerability with
   the host I’m using and they’ll say it was a vulnerability with the WordPress 
   script. So, I’m wondering what would be the smart thing for me to do at this 
   point?
 *  [jimatwork](https://wordpress.org/support/users/jimatwork/)
 * (@jimatwork)
 * [20 years, 3 months ago](https://wordpress.org/support/topic/my-wordpress-script-was-vulnerable/#post-314235)
 * I had the same problem this past weekend. I would like to know where the vulnerability
   is, too. No problems with WP yet, just to my html pages which were deleted and
   replaced with a new index.html file.
 *  Thread Starter [pezastic](https://wordpress.org/support/users/pezastic/)
 * (@pezastic)
 * [20 years, 3 months ago](https://wordpress.org/support/topic/my-wordpress-script-was-vulnerable/#post-314236)
 * Yeah, my WP stuff seems to be intact and I was considering upgrading from 2.0
   to 2.01, but what’s to stop this hacker from destroying my frontpage again? I
   had never had a problem with WP before and then my host provider said someone
   had gained access to a WP script to send out tons of spam email to people. So,
   they deleted the offending file and suggested I look into the matter further,
   which I did.
 * I upgraded WP from 1.5 to 2.0 and thought the problem was solved. Now, my site
   has been hacked again, either through the host provider or WP. Now, my host provider
   hasn’t changed the setup since I’ve been with them and Lord knows how many upgrades
   WP has been through (as we’ve all read the long list of problems with this last
   upgrade), so I’m inclined to believe the problem lies somewhere with WP.
 * What do they say when you don’t like the program on TV? “Change the channel!”
   Well, that’s easier said than done with all the stuff I’ve put on my WP. I’ve
   been putting my faith in this program for a long time and have appreciated all
   the support help I’ve received.
 * I just hope that someone has a fix for this current one, because I don’t want
   to invest more years of my times making posts that will eventually end up being
   hacked away.
 * Yes, there are backup plugins, but the problem with plugins is that they can’t
   keep up with the version changes that WP is going through.
 * So, what to do?
 *  [Glo](https://wordpress.org/support/users/glo/)
 * (@glo)
 * [20 years, 3 months ago](https://wordpress.org/support/topic/my-wordpress-script-was-vulnerable/#post-314238)
 * Your Web host is probably the only one who can help you. Bt examining your logs,
   your host should be able to track down the problem, unless the hackers covered
   their tracks very well. But even if they did, your host can tell if your logs
   were reset.
 * While WP has no know vulnerabilities, there could be something in a plugin that
   allowed a script kiddie to deface your site but I’m guessing it was something
   else on your server. If you have Front Page extensions, there is a vulnerability.
   Not sure how it all works but there is information on site defacement via FP 
   extensions if you do a search.
 * It’s against the law to deface a site but the script kiddies do it because they
   can. If you do some research, you can even find scripts with instruction on how
   to deface a site. I have one (a php defacement script) that was used in an attempt
   to deface my WP blog. It wasn’t successful but they tried several times.
 * Anyway, I’d contact my host and hope they have the skills required to track down
   the problem. If it is a WP problem, then I’m sure the developers would like to
   know. Your host will need to supply the evidence that it is a WP problem, not
   just say it is – that will not help anyone and it will not give the developers
   what they need in order to fix any possible problem.
 * Good luck!
 *  [jimatwork](https://wordpress.org/support/users/jimatwork/)
 * (@jimatwork)
 * [20 years, 3 months ago](https://wordpress.org/support/topic/my-wordpress-script-was-vulnerable/#post-314239)
 * My html was not written using FrontPage, but rather just an editor that didn’t
   add any additional tags.
 *  [Chris_K](https://wordpress.org/support/users/handysolo/)
 * (@handysolo)
 * [20 years, 3 months ago](https://wordpress.org/support/topic/my-wordpress-script-was-vulnerable/#post-314240)
 * Good deal Jim. But your SERVER may have frontpage EXTENSIONS installed. not you.
   or your desktop. but the server.
 * It is frequently alleged that they can be a security risk.
 *  Thread Starter [pezastic](https://wordpress.org/support/users/pezastic/)
 * (@pezastic)
 * [20 years, 3 months ago](https://wordpress.org/support/topic/my-wordpress-script-was-vulnerable/#post-314241)
 * I have requested more detailed information from my server and will update this
   thread as it becomes available. BTW, I do not have FP Extensions installed. I
   used to use FP as a sort of manual weblog, years ago, but that was with a different
   server and I verified with my current one, through CPanel, that FP extensions
   are disabled.
 *  [Glo](https://wordpress.org/support/users/glo/)
 * (@glo)
 * [20 years, 3 months ago](https://wordpress.org/support/topic/my-wordpress-script-was-vulnerable/#post-314242)
 * jimatwork, the use of FP extensions is not the only way a script kiddie can deface
   a site. Do the research, there are many server-side applications that they can
   and do use. PHP, cgi. etc… The fact that your html page was replaced, says they
   got in somehow or were able to replace that file with a script. Let us hope they
   didn’t actually get into your server, since they could do serious damage if they
   did.
 * Contact your host and have them analyze the log files for your site if you don’t
   know how to do it yourself or don’t know what to look for. That is the best advice
   anyone can give you.
 *  Thread Starter [pezastic](https://wordpress.org/support/users/pezastic/)
 * (@pezastic)
 * [20 years, 3 months ago](https://wordpress.org/support/topic/my-wordpress-script-was-vulnerable/#post-314243)
 * This is the reply I got from my host:
    - Hello,
    - Did you delete the database?
    - Database could have been modification so that they can get back in at any 
      time.
    - Did you delete ALL files within your web space? Files can be modify and hidden
      in directories so that they can get back in at any time.
    - Did you keep all files within your web space up-to-date on a daily basis?
      
      Old vulnerable scripts like [http://www.bbiverson.com/gallery/](http://www.bbiverson.com/gallery/)?
      Since your domain is now on hacker scoreboards updating daily probably isn’t
      good enough. You should check for updates to your scripts several times per
      day.
    - All log files can be accessed using cpanel. Please hire a webmaster if you
      need help in keeping your scripts within your web space secure and up-to-date.
    - Best regards,
       Web Hosting Services
 * They’re asking me to delete my database? That’s the same as deleting WordPress!
 * I looked under CPanel and there are three references to logs: Raw Access Logs,
   Raw Log Manager, and Error Log. None of them have anything timestamped farther
   back than 24 hours ago. Here is a link to my Raw Access Log:
 * [
    Raw Access Log
 * Is that the log my host is referencing, because I don’t see any other in CPanel?
   If the infraction occurred prior to 24 hours ago, how can I determine what caused
   it and how to avoid it in the future?
 *  [Mark (podz)](https://wordpress.org/support/users/podz/)
 * (@podz)
 * [20 years, 3 months ago](https://wordpress.org/support/topic/my-wordpress-script-was-vulnerable/#post-314244)
 * I think your host is talking bollocks and while a tiny bit of their info could
   be seen as possibly correct given that it’s their hosting environment, it’s scripts
   in that environment that are being used and that they have control over that 
   environment then asking you to sort it all out shows that they haven’t a clue
   between them.
 * Move hosts today. Seriously – move to a better host.
 * ———
 * Without knowing specifically what databases you have, check the users for each
   app. Delete all but you. Change all your passwords to long complex strings auch
   as 8Jik:mNiP(d/GDF53]
 * CHMOD every file to 644
    Every directory to 755
 * That will go someway to help.
 * But the best advice is to move and do it now. There are many threads about good
   hosts but [http://www.asmallorange.com](http://www.asmallorange.com) and [http://laughingsquid.com](http://laughingsquid.com)
   get no complaints in these forums.
 *  [Glo](https://wordpress.org/support/users/glo/)
 * (@glo)
 * [20 years, 3 months ago](https://wordpress.org/support/topic/my-wordpress-script-was-vulnerable/#post-314245)
 * _If the infraction occurred prior to 24 hours ago, how can I determine what caused
   it and how to avoid it in the future?_
 * I don’t think anyone here can help you, at least not without seeing what’s in
   your directories. I doubt your database was compromised. If you can’t change 
   hosts (which I would highly recommend) then go in and delete the html file that’s
   showing right now and look for anything else suspicious and remove it. Back everything
   up first. Check your logs daily and wait and see what happens. Oh, I would remove
   the gallery program since there’s no photos in it anyway.
 * You could also backup your database, then remove the wp tables in MySQL, remove
   everything related to WP and any other program you have installed yourself, including
   images, from your directories, then do a clean install. You can dump your database
   content back in after the new install and reload any images you might want. If
   you need help doing that, email me at glo (at) wild-mind.net and I’ll tell you
   how. If you have changed the look of your blog, save the theme you changed to
   your hard drive, if you don’t already have it on your computer (hopefully you
   do).
 * Good luck!
 *  [Glo](https://wordpress.org/support/users/glo/)
 * (@glo)
 * [20 years, 3 months ago](https://wordpress.org/support/topic/my-wordpress-script-was-vulnerable/#post-314246)
 * Okay, I found this warning by doing a search for Linux_Drox [http://secunia.com/advisories/17410/](http://secunia.com/advisories/17410/)–
   so, your database may have been compromised. Before inserting any database backups
   into a clean install, the content should be examined.

Viewing 15 replies - 1 through 15 (of 21 total)

1 [2](https://wordpress.org/support/topic/my-wordpress-script-was-vulnerable/page/2/?output_format=md)
[→](https://wordpress.org/support/topic/my-wordpress-script-was-vulnerable/page/2/?output_format=md)

The topic ‘My WordPress script was vulnerable?’ is closed to new replies.

 * In: [Fixing WordPress](https://wordpress.org/support/forum/how-to-and-troubleshooting/)
 * 21 replies
 * 8 participants
 * Last reply from: [pezastic](https://wordpress.org/support/users/pezastic/)
 * Last activity: [20 years, 1 month ago](https://wordpress.org/support/topic/my-wordpress-script-was-vulnerable/page/2/#post-314278)
 * Status: resolved

## Topics

### Topics with no replies

### Non-support topics

### Resolved topics

### Unresolved topics

### All topics
