WordPress Site Hacked?
Find & Fix It in 30 Seconds
Run a free external scan to detect malware, backdoors, spam injection, and hidden redirects — no plugin, no login, no credit card.
22 security checks · No signup required · External scan only (no plugin)
8 Signs Your WordPress Site Is Hacked
Hackers often hide their tracks. Your site may be infected without any obvious visible signs. Here are the most common indicators:
Why WordPress Sites Get Hacked
WordPress powers 43% of the web, making it the biggest target for automated attacks. The most common entry points:
How to Fix a Hacked WordPress Site
Follow these steps in order. Skipping steps — especially step 1 and step 3 — is the most common reason sites get re-infected within days.
-
1Scan your site to identify the infectionBefore you do anything else, run a free scan on wp-scan.org/malware-check. The report will identify exactly which checks failed — backdoors, spam injection, dangerous files, security header gaps — so you know what you're dealing with before you start cleaning.
-
2Take the site offline / enable maintenance modePut your site in maintenance mode immediately to stop serving malicious content to visitors and prevent further Google blacklisting. Most hosts have a one-click option. Alternatively, add a maintenance plugin or temporarily rename your index.php.
-
3Change every password immediatelyChange your WordPress admin password, FTP/SFTP credentials, database password (update wp-config.php), hosting control panel password, and email account password. Use a unique, randomly generated password for each. If an attacker has one of these, they can reinstall their backdoor after you clean everything else.
-
4Remove the infected filesUsing the wp-scan.org findings as a guide, delete the specific files identified in the report. For PHP backdoors and webshells: delete the file entirely — do not just comment out the code. For injected content in core WordPress files (wp-settings.php, wp-login.php, etc.), reinstall WordPress core via the admin dashboard or by uploading a fresh copy via FTP.
-
5Update everything — core, plugins, themesUpdate WordPress core to the latest version. Update every plugin and theme. Delete any plugins or themes you don't actively use — deactivated but installed plugins are still a vulnerability. Delete any nulled or pirated software permanently.
-
6Remove unknown admin accountsGo to WordPress Admin → Users and delete any accounts you don't recognize. Check especially for accounts created recently or with administrator roles. Also check your database directly:
SELECT * FROM wp_users ORDER BY user_registered DESCin phpMyAdmin. -
7Harden your site against re-infectionAdd a Web Application Firewall (Cloudflare free tier or Wordfence). Disable XML-RPC if you don't use it (
add_filter('xmlrpc_enabled','__return_false')). Enable two-factor authentication on all admin accounts. Set correct file permissions (644 for files, 755 for directories, 600 for wp-config.php). -
8Request Google review to remove blacklistingOnce your site is clean, go to Google Search Console → Security Issues and click "Request a Review". Google typically reviews within 1–3 days. Run a final scan on wp-scan.org before submitting to confirm all issues are resolved.
Scan Your WordPress Site Now
Free. No plugin. No account. 30 seconds to a complete security report.
22 security checks · Backdoors, spam injection, malicious JS, headers, and more