Hi everyone,
I am currently monitoring logs via Wazuh Manager for a WordPress site. I do not have direct terminal access to the web server, so I am relying on Wazuh alerts and logs to report issues to the server admin team.
I’ve spotted some suspicious log entries that weren't flagged by default rules, and I’m concerned they might be a Web Shell (Backdoor) activity.
Example Log Entries (Redacted for Security):
Observations:
My Questions:
1.From your experience, is this a confirmed threat (Web Shell or anything else)?
2. Is it normal for a WordPress site to have hex-encoded strings in URL parameters
Hello,
Thank you for sharing the log samples and your observations. Based on what you’ve provided, this activity is highly suspicious and not typical of legitimate WordPress behavior.
While we cannot confirm compromise without file system access, the indicators strongly suggest malicious activity, likely related to a web shell or file disclosure backdoor.
Key red flags:
PHP execution inside asset directories such as /js/ or deeply nested theme/plugin folders. These locations normally contain static files (JavaScript, CSS, images), not executable PHP scripts.
Hex-encoded parameters (d= and s=) that decode to internal filesystem paths like /var/www/..., .htaccess, index.php, or web.config.
HTTP 200 responses, which may indicate that the script is successfully processing the request.
This pattern is consistent with web shells that:
Accept encoded file paths as parameters
Read sensitive files from disk
Return their contents in the HTTP response
It is not standard WordPress behavior.
Hex-encoded parameters are not inherently malicious. They are sometimes used for:
Tokens
Hashes
Obfuscated identifiers
However, in this context, where the decoded values correspond to server paths and sensitive configuration files, this is not normal for WordPress core, themes, or plugins.
Combined with the unusual file location and execution pattern, this strongly increases the likelihood of malicious intent.
Since you don’t have direct shell access, you can escalate this to the server administration team with the following recommendations:
Inspect the referenced PHP files
Verify whether the files actually exist.
Review their contents for obfuscated code (e.g., eval(), base64_decode(), gzinflate(), etc.).
Check file integrity
Compare theme/plugin files against clean copies from official sources.
Look for recently modified or newly created PHP files in wp-content.
Review WordPress admin accounts
Check for unauthorized users.
Reset passwords if compromise is suspected.
Search for similar requests
Query for other .php?d= or .php?s= patterns.
Identify repeated source IPs or automated scanning behavior.
Consider restoring from a known clean backup if a compromise is confirmed.
--
You received this message because you are subscribed to the Google Groups "Wazuh | Mailing List" group.
To unsubscribe from this group and stop receiving emails from it, send an email to wazuh+un...@googlegroups.com.
To view this discussion visit https://groups.google.com/d/msgid/wazuh/11960774-5131-4818-8341-a856c989e8d3n%40googlegroups.com.