Threat Intel
43% of all websites run WordPress — making it the #1 attack surface worldwide 1 in 25 WordPress sites is actively infected with malware right now 97% of CMS-based attacks specifically target WordPress plugins & themes 50,000+ vulnerabilities indexed · WPScan threat database 71% of hacked WordPress sites had a backdoor silently installed 4,000+ plugins carry known, unpatched security vulnerabilities Average breach goes undetected for 197 days — is your site clean? Outdated plugins are responsible for 52% of all WordPress infections SQL injection & XSS remain the top two WordPress attack vectors 60% of infections exploit a vulnerability that already had a patch available 43% of all websites run WordPress — making it the #1 attack surface worldwide 1 in 25 WordPress sites is actively infected with malware right now 97% of CMS-based attacks specifically target WordPress plugins & themes 50,000+ vulnerabilities indexed · WPScan threat database 71% of hacked WordPress sites had a backdoor silently installed 4,000+ plugins carry known, unpatched security vulnerabilities Average breach goes undetected for 197 days — is your site clean? Outdated plugins are responsible for 52% of all WordPress infections SQL injection & XSS remain the top two WordPress attack vectors 60% of infections exploit a vulnerability that already had a patch available
Scan Free →
wp-scan.org

Free WordPress Malware Scanner

WordPress malware is typically injected into theme or plugin PHP files as obfuscated, base64-encoded code that downloads payloads, redirects visitors, or installs backdoors. It's designed to be invisible — standard file managers won't catch it. wp-scan.org reads every PHP, JS, and HTML file in your upload and matches against 40+ malware signatures including eval/base64 shells, iframe injectors, and known backdoor patterns.

What wp-scan.org detects

  • Base64-encoded eval() shells (the most common backdoor type)
  • PHP web shells with command execution capabilities
  • Injected iframe redirects to malicious domains
  • Obfuscated code using str_rot13, gzinflate, or hex encoding
  • Fake plugin/theme wrappers that execute hidden payloads
  • Remote file fetch patterns (file_get_contents with external URLs)

Scan your WordPress files now — free

Drop your ZIP here

or click to browse · up to 20 MB free

Want to see what a Premium report looks like?

View a real scan with line numbers, fix guides, and secure code for every finding.

View sample report →

Common questions

See exact line numbers and fix guides for every finding

Upgrade to Premium — from $9.99/mo →