Support » Fixing WordPress » possible exploit in tinymce js

  • Hi, everyone, i’ve been using wordpress for almost a year now to run my magazine site and soon after I upgraded to 2.0 the other day and a day or so later a bot used one of the javascripts to insert an exploit (the wmf exploit that is on the news) to every php and html file in my account. It then began trying to serve the exploit to my visitors from a url that I won’t post because it is direct to the wmf file. I’m protected against it and the only way I even notice it is anti-vir kept giving me warnings. I have screenshots of the warnings. My site is hosted at powweb and they kept turning off my wordpress database telling me it was abusing the system, so i restored a backup and that seemed to stop it, but when I went into wordpress to write a post and clicked the edit html button on the tinymce quicktags, it started all over again. Does anyone know if this is a possible exploit in tinymce js and has anyone else had this problem? How can I get rid of it? I deleted tinymce from my server, just in case.
    thanks in advance for any help I may recieve.

Viewing 13 replies - 1 through 13 (of 13 total)
  • “a bot used one of the javascripts to insert an exploit (the wmf exploit that is on the news) to every php and html file in my account”

    That sounds like a host that dose things on the cheap and does not take server security into consideration.

    Move hosts.

    I’ll let someone with more knowledge definitely shoot this down, but from others who have had this WMF exploit, it’s because of the shared hosting environment and some pathetic script-kiddie. There is nothing here to implicate WP.

    Powweb … take your money elsewhere.

    To deal with it – you need to delete every file that is infected.

    Download everything.
    Delete certainly all the WP files
    Upload new
    Check non-wp files and upload if clean.


    If you are on Windows, download everything (literally) then use a search program like Agent Ransack to search for the url that users are being directed to. That will show what and where to clean.

    Agent Ransack:

    I’ve already cleaned it up twice, deleteing entire site, cleaning every file with multi-replace, checking them to make sure the code is gone from each page, restoring a backup, and it goes away, but then when I use the feature rich text editor, it starts again.
    this is the code that was replicating into every php and html in my site


    This is the code (translated):

    ‘document.write(\'<iframe src=”” height=0 width=0 border=0 frameborder=0></iframe>\’)’

    now that I have removed tinymce completely it has stopped, but i’m worried that won’t stop this from happening in the future and maybe it is happening seamlessly to other sites, like i mentioned, I would not have detected it if I wasn’t using zone alarm/antivir, it would have slipped the file into my temporary internet folder without even asking me. Honestly, i have never had trouble with powweb until upgrading wordpress a few days ago. I’m not blaming wordpress or anything, just bots and hackers, but I like using tinymce and I want to block it, or get that site pulled so they can’t do it anymore. 🙁 Any suggestions?
    thank for all your help!

    edit: I also tested in 3 browsers and it it affected all of them, so it isn’t just IE.

    I just went to that site (I’m reckless) and there seems to be nothing there now.

    Are you sure you are fully deleting the server stuff, downloaded a new WP from here, cleared all caches etc ?

    yeah it looks blank if you don’t have a program to alert you that it is there. I get a warning in antivir that says the site is trying to install reverse_fun.wmf which is a known exploit/virus. If you view the source on that page it links to http:// .cc/dia489/ lau.jpg which is nothing also. If you have anti-virus software I suggest you update it and run it, just in case, because it installs seamlessly you won’t notice until it’s messing things up. I patched windows when the patch hit microsoft update and it still almost infected my PC. Could it have gotten into my database? I haven’t install a new copy of wordpress because if it’s in the database it will just start again and right now I have it contained. I’m not too good with mysql so i’m not sure how to check.
    edit: if you are not sure please don’t follow that above image.

    I’ve broken the image link.

    it does look like it’s gone down since a few hours ago but the image with the exploit in it is still there
    try adding .wmf to the end of that url in place of .html and a graphic tries to download which is the actual exploit. This is what is popping up in my browser
    and that site is still there.




    for a very critical analysis of what you are seeing, read this:

    So how exactly is it getting into my website? I’ve used hijack this and anti-virus software, three browsers, system restore, ad-aware, spybot and a few other programs and it isn’t showing on my harddrive or windows system files anywhere. IE hasn’t been changed on my PC at all. I was in the middle of writing a post when it started. 🙁




    do you have access to your servers raw logs? if so, I would love to take a look at them. Of course, depending on your time, the downloadable copy wont have “todays” hits in them.

    I have access to logs in ftp and logs in the user manager, not sure if they are raw or cleaned up for dummies. The exploit attack was wednesday and thursday. I was awake for 27 hours trying to find out how they did it. How should I send or show the logs? Would be grateful for any help.
    my site is and wordpress is at




    ohh, well if it happened then, yes it would all be in your server logs, if you like feel free to send a copy of the tar.gz to logs AT

    Honestly a good look at what exactly goes on server side would be very interesting…

    and yes, they should be raw apache logs

    if its easier for you you could even post the tar.gz on your site, provide the link, and ill download it. Whichever is easiest.




    duvy, got your email, the logs, and I replied. Thank you again, hopefully I might shed some light on what happened.

Viewing 13 replies - 1 through 13 (of 13 total)
  • The topic ‘possible exploit in tinymce js’ is closed to new replies.