Skip to content
This repository has been archived by the owner on Jan 27, 2021. It is now read-only.

Loading malicious script #13

Open
steveperrycreative opened this issue Jan 20, 2021 · 5 comments
Open

Loading malicious script #13

steveperrycreative opened this issue Jan 20, 2021 · 5 comments

Comments

@steveperrycreative
Copy link

This plugin loads a script from https://assets.digitalclimatestrike.net/widget.js. This file may have been compromised as it redirects users to gladdiator[dot]io.

Our scanners are picking this up as malicious.

@rauwuckl
Copy link

rauwuckl commented Jan 24, 2021

yeah, definitely malicious!

Solution: Deactivate then deinstall the plugin in Wordpress. We also had to restart the Wordpress server to clear some caches.

@steveperrycreative
Copy link
Author

This is now also registered in WPScan's database and the plugin has been removed from the WordPress plugin repo.

@LuBeeGee
Copy link

Hi. I have this problem on my site. I removed the plugin ages ago but getting this malicious re-direct. Is anyone able to explain how to clear the Wordpress caches as mentioned above?

@LuBeeGee
Copy link

I have been trying to fix this today. I could see the line in my code when viewing source on the live webpage but not in the source through the Wordpress editor. But after pouring over it, I just spotted a small icon in the source code - like a video icon - and that was it. I've removed that and it seems to have gone from my site. I hope!

@rauwuckl
Copy link

We have Wordpress deployed with docker-compose. So we restarted the container with 'docker-compose down' 'docker-compose up'. Afterwards the references to climatestrike disappeared.

I am also not a Wordpress expert so i dont know what exactly this did and how it translates to your situation.

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants