Attempt to exploit vulnerability? - by barry.tuber

This topic has 5 replies, 2 voices, and was last updated 2 years, 6 months ago ago by barry.tuber

  • Avatar: barry.tuber
    barry.tuber
    Participant
    October 1, 2021 at 13:07

    Since 9/26 I am seeing error log entries multiple times per minute that look like these:

    [01-Oct-2021 11:21:03 UTC] File:theme-functions.php:1509 test
    [01-Oct-2021 11:21:07 UTC] File:theme-functions.php:1509 test
    [01-Oct-2021 11:21:18 UTC] File:theme-functions.php:1509 test
    [01-Oct-2021 11:21:28 UTC] File:theme-functions.php:1509 test
    [01-Oct-2021 11:21:31 UTC] File:theme-functions.php:1509 test
    [01-Oct-2021 11:21:42 UTC] File:theme-functions.php:1509 test
    [01-Oct-2021 11:21:48 UTC] File:theme-functions.php:1509 test

    Is there a vulnerability in the Xstore theme that someone is trying to exploit, or do you have an idea of what else might be going on?

    Thanks,

    Barry

    Please, contact administrator
    for this information.
    4 Answers
    Avatar: Rose Tyler
    Rose Tyler
    Support staff
    October 1, 2021 at 14:59

    Hello,

    Take our apologies for the inconvenience. We’ll fix this issue in the next theme update.
    Provide temporary FTP access and we’ll fix this for you before the update.

    Regards

    Avatar: barry.tuber
    barry.tuber
    Participant
    October 1, 2021 at 15:14

    Thanks! I am not comfortable providing FTP access to the live site, and can’t easily do that for the development server. I can make code changes myself if you tell me what to change or which scripts to replace. If not, when will the next update be released?

    Barry

    Avatar: Rose Tyler
    Rose Tyler
    Support staff
    October 1, 2021 at 15:20

    https://prnt.sc/1tt9cs5 – delete this line of code

    Regards

    Avatar: barry.tuber
    barry.tuber
    Participant
    October 1, 2021 at 19:25

    Thanks! All set.

  • Viewing 5 results - 1 through 5 (of 5 total)

The issue related to '‘Attempt to exploit vulnerability?’' has been successfully resolved, and the topic is now closed for further responses

We're using our own and third-party cookies to improve your experience and our website. Keep on browsing to accept our cookie policy.