Tagged: ajax, avia, malicious code, Security
Hi,
WORDFENCE give me today several warnings on this ENFOLD file:
../framework/php/function-set-avia-ajax.php
This file is a PHP executable file and contains the word ‘eval’ (without quotes) and the word ‘base64_decode’ (without quotes). The eval() function along with an encoding function like the one mentioned are commonly used by hackers to hide their code.
Could you tell me the reason for this and how to handle it? I won’t have any security problems at my sites.
Thanks a lot in advance.
Hi COLORIT!
WordFence is incorrect. See: https://kriesi.at/support/topic/malicious-code-found-in-avia-framework/#post-219644
Best regards,
Devin