Threat Intel
43% of all websites run WordPress — making it the #1 attack surface worldwide 1 in 25 WordPress sites is actively infected with malware right now 97% of CMS-based attacks specifically target WordPress plugins & themes 50,000+ vulnerabilities indexed · WPScan threat database 71% of hacked WordPress sites had a backdoor silently installed 4,000+ plugins carry known, unpatched security vulnerabilities Average breach goes undetected for 197 days — is your site clean? Outdated plugins are responsible for 52% of all WordPress infections SQL injection & XSS remain the top two WordPress attack vectors 60% of infections exploit a vulnerability that already had a patch available 43% of all websites run WordPress — making it the #1 attack surface worldwide 1 in 25 WordPress sites is actively infected with malware right now 97% of CMS-based attacks specifically target WordPress plugins & themes 50,000+ vulnerabilities indexed · WPScan threat database 71% of hacked WordPress sites had a backdoor silently installed 4,000+ plugins carry known, unpatched security vulnerabilities Average breach goes undetected for 197 days — is your site clean? Outdated plugins are responsible for 52% of all WordPress infections SQL injection & XSS remain the top two WordPress attack vectors 60% of infections exploit a vulnerability that already had a patch available
Scan Free →
wp-scan.org

WordPress Backdoor & Shell Scanner

After a WordPress site is compromised, attackers plant backdoors to maintain access even after you change passwords. These are usually PHP files with names like wp-info.php or hidden inside plugin folders, and they respond to secret POST requests with file management, command execution, or database access. wp-scan.org detects the code patterns used in these shells regardless of filename.

What wp-scan.org detects

  • PHP shells using system(), exec(), passthru(), or shell_exec()
  • Backdoors triggered by secret POST parameter checks
  • Base64/gzip-encoded payloads that decode at runtime
  • assert() and preg_replace() /e modifier code execution
  • File manager capabilities hidden in WordPress files
  • C99, r57, WSO and other known web shell code signatures

Scan your WordPress files now — free

Drop your ZIP here

or click to browse · up to 20 MB free

Want to see what a Premium report looks like?

View a real scan with line numbers, fix guides, and secure code for every finding.

View sample report →

Common questions

See exact line numbers and fix guides for every finding

Upgrade to Premium — from $9.99/mo →