Skip Navigation

[Gelöst] Wordfence flags files as vulnerable.

This support ticket is created vor 6 Jahre, 10 Monate. There's a good chance that you are reading advice that it now obsolete.

This is the technical support forum for Toolset - a suite of plugins for developing WordPress sites without writing PHP.

Everyone can read this forum, but only Toolset clients can post in it. Toolset support works 6 days per week, 19 hours per day.

No supporters are available to work today on Toolset forum. Feel free to create tickets and we will handle it as soon as we are online. Thank you for your understanding.

Sun Mon Tue Wed Thu Fri Sat
8:00 – 12:00 8:00 – 12:00 8:00 – 12:00 8:00 – 12:00 8:00 – 12:00 - -
13:00 – 17:00 13:00 – 17:00 13:00 – 17:00 13:00 – 17:00 13:00 – 17:00 - -

Supporter timezone: America/New_York (GMT-04:00)

This topic contains 1 Antwort, has 2 Stimmen.

Last updated by Christian Cox vor 6 Jahre, 10 Monate.

Assisted by: Christian Cox.

Author
Artikel
#526699

I am trying to keep site secure.
Wordfence notes " wp-content/plugins/wp-views/embedded/inc/wpv-condition.php"

"This file is a PHP executable file and contains the word 'eval' (without quotes) and the word 'base64_decode(' (without quotes). The eval() function along with an encoding function like the one mentioned are commonly used by hackers to hide their code. If you know about this file you can choose to ignore it to exclude it from future scans. This file was detected because you have enabled HIGH SENSITIVITY scanning. This option is more aggressive than the usual scans, and may cause false positives.
Can I delete this file with impunity?

#526717

Hi, you may exclude this file from future scans, but you should not delete it completely. It is required to support conditional statements, and deleting it may have unexpected side effects up to and including completely broken site.

This ticket is now closed. If you're a WPML client and need related help, please open a new support ticket.