How to Clean Up a Symlink Attack on WordPress - Complete Recovery Guide

How to Clean Up a Symlink Attack on WordPress  Complete Recovery Guide
Posted 03 April 2025

WordPress installations are prime targets for symlink attacks due to their popularity and predictable file structure. When a WordPress site falls victim to a symlink attack, cleaning up can be particularly challenging because the platform's complexity offers attackers numerous places to hide malicious code and establish persistence mechanisms.

This guide will walk you through how to clean up symlink attacks on WordPress sites effectively and prevent reinfection. The process requires attention to WordPress-specific files, database tables, and configurations that might be overlooked in a general server cleanup.

Understanding Symlink Attacks

This article focuses specifically on cleaning up WordPress sites after a symlink attack. For a comprehensive understanding of how symlink attacks work, how they affect different hosting environments, and general server-level cleanup procedures, please read our complete guide: How to Identify and Clean Up a Symlink Attack on Shared Hosting.

Identifying a Symlink Attack on WordPress

Before cleaning up, confirm that your WordPress site is indeed suffering from a symlink attack. Here are WordPress-specific signs to look for:

Common Symptoms

  • Unauthorized admin users appearing in your WordPress dashboard
  • Posts or pages containing spam links or content you didn't create
  • Website redirecting visitors to suspicious sites
  • Search engines flagging your site as containing malware
  • Strange code appearing at the top or bottom of your theme files
  • Unexplained changes to your .htaccess file
  • WordPress keeps getting hacked after cleaning

WordPress-Specific Files to Check

Customize Commands for Your Server

Enter your WordPress installation path to automatically update all commands in this article:

Example: /home/username/public_html/wordpress or /var/www/html/mysite

Examine these WordPress locations for signs of compromise:

# Look for recently modified files in WordPress core directories
find /path/to/wordpress/wp-admin -type f -mtime -7
find /path/to/wordpress/wp-includes -type f -mtime -7
# Check for PHP files in the uploads directory (typically not allowed)
find /path/to/wordpress/wp-content/uploads -name "*.php"
# Look for hidden files in WordPress directories
find /path/to/wordpress -name ".*php" -type f
Note: If you're on shared hosting and don't have command-line access, you can use FTP/SFTP to browse these directories and look for recently modified files or files with suspicious names.

Initial Response and Containment

Once you've confirmed a symlink attack on your WordPress site, take these immediate steps:

1. Temporarily Disable Your Site

Create or modify your .htaccess file to prevent public access while you clean up:

# Add to .htaccess in WordPress root directory
<IfModule mod_authz_core.c>
Require all denied
Require ip YOUR_IP_ADDRESS
</IfModule>
<IfModule !mod_authz_core.c>
Order deny,allow
Deny from all
Allow from YOUR_IP_ADDRESS
</IfModule>

Replace YOUR_IP_ADDRESS with your actual IP address to maintain your own access.

2. Create a Backup

Even though the site is compromised, create a backup for forensic analysis and in case you need to refer to something during cleanup:

# Backup WordPress files
tar -czf wordpress-infected-backup.tar.gz /path/to/wordpress
# Backup WordPress database
mysqldump -u username -p database_name > wordpress-infected-db.sql
Warning: Label this backup clearly as "infected" and never use it to restore your site. It's only for reference during the cleanup process.

3. Change All Passwords

Immediately change passwords for:

  • WordPress admin accounts
  • FTP/SFTP accounts
  • Database users
  • Control panel accounts (cPanel, Plesk, etc.)
  • SSH accounts if applicable

Cleaning Up WordPress Core Files

WordPress core files are often modified during a symlink attack. Here's how to clean them up:

Verifying Core File Integrity

If you have WP-CLI installed, check core file integrity:

# Navigate to WordPress root directory
cd /path/to/wordpress
# Verify core files
wp core verify-checksums

If you don't have WP-CLI, follow these steps:

  1. Download a fresh copy of your WordPress version from wordpress.org/download/releases/
  2. Extract the ZIP file to a temporary location
  3. Replace these directories and files (but NOT wp-config.php):
    • /wp-admin/
    • /wp-includes/
    • All root PHP files (index.php, wp-login.php, etc.)

Securing wp-config.php

The wp-config.php file is a primary target in symlink attacks. Check for unauthorized modifications:

# Look for suspicious code in wp-config.php
grep -i "eval|base64|gzinflate|str_rot13|include" wp-config.php

Check for unauthorized include statements or database definitions. If wp-config.php is compromised, create a fresh copy with your legitimate database credentials and WordPress salts.

WordPress Themes and Plugins Cleanup

Themes and plugins are common hiding places for malicious code in WordPress symlink attacks:

Checking Themes

# Find recently modified PHP files in themes directory
find /path/to/wp-content/themes -name "*.php" -type f -mtime -14
# Search for suspicious code patterns
find /path/to/wp-content/themes -name "*.php" -type f -exec grep -l "eval|base64_decode|gzinflate" {} ;

Pay special attention to:

  • Theme header files (header.php)
  • Theme functions files (functions.php)
  • Footer files (footer.php)
  • Index files (index.php)

Examining Plugins

# Find suspicious plugins
find /path/to/wp-content/plugins -name "*.php" -type f -exec grep -l "eval|create_function|passthru|system|shell_exec" {} ;

Look for:

  • Plugins that don't appear in your WordPress dashboard
  • Plugins with strange names or misspellings of popular plugins
  • Deactivated plugins that still contain malicious code

Checking Upload Directory

Attackers often hide backdoors in the uploads directory:

# Find PHP files in uploads directory (these shouldn't normally exist)
find /path/to/wp-content/uploads -name "*.php" -type f
# Check for files disguised as images but containing PHP code
find /path/to/to/wp-content/uploads -name "*.jpg" -o -name "*.png" -o -name "*.gif" | xargs grep -l " <?php

WordPress Database Cleanup

The WordPress database is often compromised during symlink attacks. Here's how to clean it up:

Removing Unauthorized Users

Check for and remove unauthorized admin users:

# SQL query to identify recently added users
SELECT ID, user_login, user_email, user_registered FROM wp_users WHERE user_registered > '2023-01-01' ORDER BY user_registered DESC;
# SQL query to remove an unauthorized user (replace USER_ID with actual ID)
DELETE FROM wp_users WHERE ID = USER_ID;
DELETE FROM wp_usermeta WHERE user_id = USER_ID;

Checking for Injected Code

Attackers often inject malicious code into the WordPress database:

# Check options table for malicious code
SELECT option_id, option_name, option_value FROM wp_options WHERE option_value LIKE '%eval%' OR option_value LIKE '%base64%' OR option_value LIKE '%javascript:void%';
# Check posts for injected content
SELECT ID, post_title, post_date FROM wp_posts WHERE post_content LIKE '%<script%' OR post_content LIKE '%eval(%' OR post_content LIKE '%base64_decode%';
# Check for suspicious postmeta entries
SELECT * FROM wp_postmeta WHERE meta_value LIKE '%eval(%' OR meta_value LIKE '%base64_decode%';

Cleaning WordPress Cron

Check for malicious scheduled tasks:

# SQL query to view the WordPress cron jobs
SELECT option_value FROM wp_options WHERE option_name = 'cron';

This returns a serialized array. Look for suspicious URLs or function calls in the cron data. If found, you can clear all cron jobs and let WordPress rebuild legitimate ones:

UPDATE wp_options SET option_value = 'a:0:{}' WHERE option_name = 'cron'; 

Why WordPress Sites Keep Getting Hacked After Cleaning

If your WordPress site keeps getting hacked after cleaning, it's likely due to one or more persistence mechanisms the attacker has established. WordPress offers several unique ways for attackers to maintain access:

Common Persistence Mechanisms in WordPress

  1. WordPress Cron Jobs - Attackers can register malicious functions to run periodically using WordPress's built-in scheduling system.
  2. Database Triggers - Sophisticated attackers might set up MySQL triggers that recreate malicious content when certain conditions are met.
  3. Plugin Auto-Update Hooks - Compromised plugins can inject code during WordPress's update process.
  4. Theme header/footer injections - Code that loads external scripts from command and control servers.
  5. User meta with malicious capabilities - Hidden user capabilities that grant ongoing access.
  6. Backdoored core functions - Modifications to WordPress core functions that execute malicious code.

To break the cycle of reinfection, you must identify and remove all persistence mechanisms. The checklist below addresses these hiding spots.

WordPress Symlink Attack Cleanup Checklist

  1. Initial Containment: Temporarily disable the site using .htaccess
  2. Reset User Credentials: Change WordPress admin passwords, database passwords, and FTP credentials
  3. Core File Verification: Verify integrity of wp-admin and wp-includes directories
  4. wp-config.php Review: Check for unauthorized database connections or include statements
  5. Theme Inspection: Check for modified files in all active and inactive themes
  6. Plugin Verification: Remove suspicious plugins and verify legitimate plugins
  7. Database Cleanup: Remove unauthorized users and check for injected code in options, posts, and metadata tables
  8. Media Library Scan: Look for PHP files disguised as images in uploads directory
  9. Verify .htaccess: Replace with clean version and set proper permissions
  10. Check WordPress Cron: Remove any suspicious scheduled tasks
  11. Process Check: Look for running processes spawned by compromised files
  12. Update Everything: Update WordPress core, themes, and plugins to latest versions
  13. Implement Prevention: Install security plugins and set proper file permissions
  14. Verification Testing: Check site functionality after cleanup

Dealing with Persistent .htaccess Corruption

WordPress sites frequently suffer from persistent .htaccess corruption during symlink attacks. This happens because attackers establish mechanisms to continuously regenerate malicious .htaccess rules.

Finding the Source of .htaccess Corruption

# Find files that may be modifying .htaccess
grep -r ".htaccess" --include="*.php" /path/to/wordpress
# Look for suspicious functions that might write to files
grep -r "file_put_contents|fwrite|fopen" --include="*.php" /path/to/wordpress

These persistent processes are a common reason websites keep getting hacked after cleaning, as they reactivate malicious code even after files are removed.

Securing .htaccess

  1. Create a clean .htaccess file with legitimate WordPress rules:
    # WordPress clean .htaccess
    <IfModule mod_rewrite.c>
    RewriteEngine On
    RewriteBase /
    RewriteRule ^index.php$ - [L]
    RewriteCond %{REQUEST_FILENAME} !-f
    RewriteCond %{REQUEST_FILENAME} !-d
    RewriteRule . /index.php [L]
    </IfModule>
  2. Set proper permissions to prevent modification:
    chmod 444 /path/to/wordpress/.htaccess 

Prevention and Hardening After Cleanup

After you clean up the symlink attack on your WordPress site, take these steps to prevent future attacks:

WordPress Security Plugins

Install one or more reputable security plugins:

  • Wordfence - Comprehensive security including firewall and malware scanning
  • Sucuri Security - File integrity monitoring and security hardening
  • iThemes Security - Multiple security features including brute force protection
  • Shield Security - Lightweight security plugin with good customization options

File Permissions Hardening

Set proper file permissions for WordPress:

# Directories
find /path/to/wordpress -type d -exec chmod 755 {} ;
# Filesfind /path/to/wordpress -type f -exec chmod 644 {} ;
# wp-config.php (more restrictive)
chmod 600 /path/to/wordpress/wp-config.php

WordPress Configuration Hardening

Add these security measures to your wp-config.php file:

//Disable file editing from WordPress admin
define('DISALLOW_FILE_EDIT', true); // Disable plugin and theme installation
define('DISALLOW_FILE_MODS', true); // Force SSL for admin
define('FORCE_SSL_ADMIN', true); // Limit post revisions
define('WP_POST_REVISIONS', 3);

Implement Server-Level Protections

Ask your host to implement server-level protections as described in our complete guide to symlink attack prevention, including:

  • PHP open_basedir restrictions
  • Disabling symlink following in Apache
  • Implementing ModSecurity rules

Verifying Your Cleanup

After cleaning up a symlink attack, verify your WordPress site is truly secure:

Monitoring for Reinfection

Set up ongoing monitoring to quickly detect any reinfection:

  • Configure file change detection in your security plugin
  • Set up Google Search Console to alert you to security issues
  • Implement server-level file integrity monitoring
  • Regularly check for unauthorized admin users

Final Check Before Going Live

Before removing your temporary access restriction, perform these final checks:

  1. Scan the site with multiple security plugins
  2. Check for any remaining suspicious files or database entries
  3. Verify all legitimate WordPress functionality works properly
  4. Ensure all passwords have been changed
  5. Verify all themes and plugins are up to date

Conclusion

Cleaning up a symlink attack on a WordPress site requires a methodical approach that addresses all the WordPress-specific components that may harbor malicious code. By following this guide, you can effectively eliminate the infection and its persistence mechanisms.

Remember that the key to successful recovery is thoroughness - attackers rely on website owners missing at least one backdoor or persistence mechanism. This is why WordPress sites often keep getting hacked after cleaning if the cleanup isn't comprehensive.

For a broader understanding of symlink attacks, including how they affect different types of hosting environments and server-level prevention techniques, refer to our comprehensive guide on symlink attack identification and cleanup.

Rate this Article

Related Article

How to Identify and Clean Up a Symlink Attack on Shared Hosting - Learn about the broader aspects of symlink attacks, how they work at the server level, and how to implement comprehensive server-side protections.

 


Warning: Invalid argument supplied for foreach() in /home/htmlbasi/public_html/blog.php on line 467

Warning: preg_replace(): Parameter mismatch, pattern is a string while replacement is an array in /home/htmlbasi/public_html/includes/class.HtmlSnippet.php on line 18