: str_replace(): Passing null to parameter #2 ($replace) of type array|string is deprecated in
require_once(dirname(__FILE__) . '/wordfenceConstants.php');
require_once(dirname(__FILE__) . '/wordfenceClass.php');
require_once(dirname(__FILE__) . '/wordfenceURLHoover.php');
* Mask to return all patterns in the exclusion list.
const EXCLUSION_PATTERNS_ALL = PHP_INT_MAX;
* Mask for patterns that the user has added.
const EXCLUSION_PATTERNS_USER = 0x1;
* Mask for patterns that should be excluded from the known files scan.
const EXCLUSION_PATTERNS_KNOWN_FILES = 0x2;
* Mask for patterns that should be excluded from the malware scan.
const EXCLUSION_PATTERNS_MALWARE = 0x4;
protected $resultFilesByShac = [];
public $errorMsg = false;
protected $apiKey = false;
protected $wordpressVersion = '';
protected $totalFilesScanned = 0;
protected $startTime = false;
protected $lastStatusTime = false;
protected $patterns = "";
protected static $excludePatterns = array();
protected static $builtinExclusions = array(
array('pattern' => 'wp\-includes\/version\.php', 'include' => self::EXCLUSION_PATTERNS_KNOWN_FILES), //Excluded from the known files scan because non-en_US installations will have extra content that fails the check, still in malware scan
array('pattern' => '(?:wp\-includes|wp\-admin)\/(?:[^\/]+\/+)*(?:\.htaccess|\.htpasswd|php_errorlog|error_log|[^\/]+?\.log|\._|\.DS_Store|\.listing|dwsync\.xml)', 'include' => self::EXCLUSION_PATTERNS_KNOWN_FILES),
public function __sleep(){
return array('path', 'results', 'resultFilesByShac', 'errorMsg', 'apiKey', 'wordpressVersion', 'urlHoover', 'totalFilesScanned',
'startTime', 'lastStatusTime', 'patterns', 'scanEngine');
public function __wakeup(){
public function __construct($apiKey, $wordpressVersion, $path, $scanEngine) {
$this->wordpressVersion = $wordpressVersion;
$this->api = new wfAPI($this->apiKey, $this->wordpressVersion);
if($path[strlen($path) - 1] != '/'){
$this->scanEngine = $scanEngine;
//First extract hosts or IPs and their URLs into $this->hostsFound and URL's into $this->urlsFound
$options = $this->scanEngine->scanController()->scanOptions();
if ($options['scansEnabled_fileContentsGSB']) {
$this->urlHoover = new wordfenceURLHoover($this->apiKey, $this->wordpressVersion);
$this->urlHoover = false;
if ($options['scansEnabled_fileContents']) {
$this->patterns = array();
* Get scan regexes from noc1 and add any user defined regexes, including descriptions, ID's and time added.
* @todo add caching to this.
protected function setupSigs() {
$sigData = $this->api->call('get_patterns', array(), array());
if(! (is_array($sigData) && isset($sigData['rules'])) ){
throw new Exception(__('Wordfence could not get the attack signature patterns from the scanning server.', 'wordfence'));
if (is_array($sigData['rules'])) {
$wafCommonStringIndexes = array();
foreach ($sigData['rules'] as $key => $signatureRow) {
list($id, , $pattern) = $signatureRow;
throw new Exception(__('Wordfence received malformed attack signature patterns from the scanning server.', 'wordfence'));
$logOnly = (isset($signatureRow[5]) && !empty($signatureRow[5])) ? $signatureRow[5] : false;
$commonStringIndexes = (isset($signatureRow[8]) && is_array($signatureRow[8])) ? $signatureRow[8] : array();
if (@preg_match('/' . $pattern . '/iS', '') === false) {
wordfence::status(1, 'error', sprintf(__('Regex compilation failed for signature %d', 'wordfence'), (int) $id));
unset($sigData['rules'][$key]);
$wafPatterns[] = $pattern;
$wafCommonStringIndexes[] = $commonStringIndexes;
$userSignatures = wfScanner::shared()->userScanSignatures();
foreach ($userSignatures as $s) {
$sigData['rules'][] = $s;
$this->patterns = $sigData;
if (isset($this->patterns['signatureUpdateTime'])) {
wfConfig::set('signatureUpdateTime', $this->patterns['signatureUpdateTime']);
* Return regular expression to exclude files or false if
* @param $whichPatterns int Bitmask indicating which patterns to include.
public static function getExcludeFilePattern($whichPatterns = self::EXCLUSION_PATTERNS_USER) {
if (isset(self::$excludePatterns[$whichPatterns])) {
return self::$excludePatterns[$whichPatterns];
if (($whichPatterns & self::EXCLUSION_PATTERNS_USER) > 0)
$exParts = wfScanner::shared()->userExclusions();
$exParts = array_filter($exParts);
foreach ($exParts as $key => &$exPart) {
$exPart = preg_quote($exPart, '/');
$exPart = preg_replace('/\\\\\*/', '.*', $exPart);
foreach (self::$builtinExclusions as $pattern) {
if (($pattern['include'] & $whichPatterns) > 0) {
$exParts[] = $pattern['pattern'];
$exParts = array_filter($exParts);
$chunks = array_chunk($exParts, 100);
self::$excludePatterns[$whichPatterns] = array();
foreach ($chunks as $parts) {
self::$excludePatterns[$whichPatterns][] = '/(?:' . implode('|', $parts) . ')$/i';
self::$excludePatterns[$whichPatterns] = false;
return self::$excludePatterns[$whichPatterns];
* @param wfScanEngine $forkObj
public function scan($forkObj){
$this->scanEngine = $forkObj;
$loader = $this->scanEngine->getKnownFilesLoader();
$this->startTime = microtime(true);
if(! $this->lastStatusTime){
$this->lastStatusTime = microtime(true);
//The site's own URL is checked in an earlier scan stage so we exclude it here.
$options = $this->scanEngine->scanController()->scanOptions();
$hooverExclusions = array();
if ($options['scansEnabled_fileContentsGSB']) {
$hooverExclusions = wordfenceURLHoover::standardExcludedHosts();
$backtrackLimit = ini_get('pcre.backtrack_limit');
if (is_numeric($backtrackLimit)) {
$backtrackLimit = (int) $backtrackLimit;
if ($backtrackLimit > 10000000) {
ini_set('pcre.backtrack_limit', 1000000);
wordfence::status(4, 'info', sprintf(/* translators: PHP ini setting (number). */ __('Backtrack limit is %d, reducing to 1000000', 'wordfence'), $backtrackLimit));
$excludePatterns = self::getExcludeFilePattern(self::EXCLUSION_PATTERNS_USER | self::EXCLUSION_PATTERNS_MALWARE);
$thisCount = wordfenceMalwareScanFile::countRemaining();
if ($thisCount == $lastCount) {
//count should always be decreasing. If not, we're in an infinite loop so lets catch it early
wordfence::status(4, 'info', __('Detected loop in malware scan, aborting.', 'wordfence'));
$files = wordfenceMalwareScanFile::files();
wordfence::status(4, 'info', __('No files remaining for malware scan.', 'wordfence'));
foreach ($files as $record) {
$file = $record->filename;
foreach ($excludePatterns as $pattern) {
if (preg_match($pattern, $file)) {
if (!file_exists($record->realPath)) {
$fileSum = $record->newMD5;
if(preg_match('/\.([a-zA-Z\d\-]{1,7})$/', $file, $matches)){
$fileExt = strtolower($matches[1]);
if(preg_match('/\.(?:php(?:\d+)?|phtml)(\.|$)/i', $file)) {
if(preg_match('/\.(?:html?)(\.|$)/i', $file)) {
if(preg_match('/\.(?:js|svg)(\.|$)/i', $file)) {
$dontScanForURLs = false;
if (!$options['scansEnabled_highSense'] && (preg_match('/^(?:\.htaccess|wp\-config\.php)$/', $file) || $file === ini_get('user_ini.filename'))) {
$isScanImagesFile = false;
if (!$isPHP && preg_match('/^(?:jpg|jpeg|mp3|avi|m4v|mov|mp4|gif|png|tiff?|svg|sql|js|tbz2?|bz2?|xz|zip|tgz|gz|tar|log|err\d+)$/', $fileExt)) {
if ($options['scansEnabled_scanImages']) {
$isScanImagesFile = true;
$isHighSensitivityFile = false;
if (strtolower($fileExt) == 'sql') {
if ($options['scansEnabled_highSense']) {
$isHighSensitivityFile = true;
if(wfUtils::fileTooBig($record->realPath, $fsize, $fh)){ //We can't use filesize on 32 bit systems for files > 2 gigs
//We should not need this check because files > 2 gigs are not hashed and therefore won't be received back as unknowns from the API server
//But we do it anyway to be safe.
wordfence::status(2, 'error', sprintf(/* translators: File path. */ __('Encountered file that is too large: %s - Skipping.', 'wordfence'), $file));
$fsize = wfUtils::formatBytes($fsize);
if (function_exists('memory_get_usage')) {
wordfence::status(4, 'info', sprintf(
/* translators: 1. File path. 2. File size. 3. Memory in bytes. */
__('Scanning contents: %1$s (Size: %2$s Mem: %3$s)', 'wordfence'),
wfUtils::formatBytes(memory_get_usage(true))
wordfence::status(4, 'info', sprintf(
/* translators: 1. File path. 2. File size. */
__('Scanning contents: %1$s (Size: %2$s)', 'wordfence'),
$stime = microtime(true);
$totalRead = (int) $record->stoppedOnPosition;
if (@fseek($fh, $totalRead, SEEK_SET) !== 0) {
if ($totalRead === 0 && @fseek($fh, $totalRead, SEEK_SET) !== 0) {
wordfence::status(2, 'error', sprintf(/* translators: File path. */ __('Seek error occurred in file: %s - Skipping.', 'wordfence'), $file));
$dataForFile = $this->dataForFile($file);
$data = fread($fh, 1 * 1024 * 1024); //read 1 megs max per chunk
$readSize = wfUtils::strlen($data);
$currentPosition = $totalRead;
$extraMsg = ' ' . __('This file was detected because you have enabled "Scan images, binary, and other files as if they were executable", which treats non-PHP files as if they were PHP code. This option is more aggressive than the usual scans, and may cause false positives.', 'wordfence');
else if ($isHighSensitivityFile) {
$extraMsg = ' ' . __('This file was detected because you have enabled HIGH SENSITIVITY scanning. This option is more aggressive than the usual scans, and may cause false positives.', 'wordfence');
$treatAsBinary = ($isPHP || $isHTML || $options['scansEnabled_scanImages']);
if ($options['scansEnabled_fileContents']) {
$allCommonStrings = $this->patterns['commonStrings'];
$commonStringsFound = array_fill(0, count($allCommonStrings), null); //Lazily looked up below
foreach ($this->patterns['rules'] as $rule) {
$stoppedOnSignature = $record->stoppedOnSignature;
if (!empty($stoppedOnSignature)) { //Advance until we find the rule we stopped on last time
//wordfence::status(4, 'info', "Searching for malware scan resume point (". $stoppedOnSignature . ") at rule " . $rule[0]);
if ($stoppedOnSignature == $rule[0]) {
$record->updateStoppedOn('', $currentPosition);
wordfence::status(4, 'info', sprintf(/* translators: Malware signature rule ID. */ __('Resuming malware scan at rule %s.', 'wordfence'), $rule[0]));
$type = (isset($rule[4]) && !empty($rule[4])) ? $rule[4] : 'server';
$logOnly = (isset($rule[5]) && !empty($rule[5])) ? $rule[5] : false;
$commonStringIndexes = (isset($rule[8]) && is_array($rule[8])) ? $rule[8] : array();
if ($type == 'server' && !$treatAsBinary) { continue; }
else if (($type == 'both' || $type == 'browser') && $isJS) { $extraMsg = ''; }
else if (($type == 'both' || $type == 'browser') && !$treatAsBinary) { continue; }
if (!$first && substr($rule[2], 0, 1) == '^') {
//wordfence::status(4, 'info', "Skipping malware signature ({$rule[0]}) because it only applies to the file beginning.");
foreach ($commonStringIndexes as $i) {
if ($commonStringsFound[$i] === null) {
$s = $allCommonStrings[$i];
$commonStringsFound[$i] = (preg_match('/' . $s . '/i', $data) == 1);
if (!$commonStringsFound[$i]) {
//wordfence::status(4, 'info', "Skipping malware signature ({$rule[0]}) due to short circuit.");
/*if (count($commonStringIndexes) > 0) {
wordfence::status(4, 'info', "Processing malware signature ({$rule[0]}) because short circuit matched.");
if (preg_match('/(' . $rule[2] . ')/iS', $data, $matches, PREG_OFFSET_CAPTURE)) {
$customMessage = isset($rule[9]) ? $rule[9] : __('This file appears to be installed or modified by a hacker to perform malicious activity. If you know about this file you can choose to ignore it to exclude it from future scans.', 'wordfence');
$matchString = $matches[1][0];
$matchOffset = $matches[1][1];
$beforeString = wfWAFUtils::substr($data, max(0, $matchOffset - 100), $matchOffset - max(0, $matchOffset - 100));
$afterString = wfWAFUtils::substr($data, $matchOffset + strlen($matchString), 100);
'severity' => wfIssues::SEVERITY_CRITICAL,
'ignoreP' => $record->realPath,
'shortMsg' => sprintf(__('File appears to be malicious or unsafe: %s', 'wordfence'), esc_html($record->getDisplayPath())),
'longMsg' => $customMessage . ' ' . sprintf(__('The matched text in this file is: %s', 'wordfence'), '<strong style="color: #F00;" class="wf-split-word">' . wfUtils::potentialBinaryStringToHTML((wfUtils::strlen($matchString) > 200 ? wfUtils::substr($matchString, 0, 200) . '...' : $matchString)) . '</strong>') . ' ' . '<br><br>' . sprintf(/* translators: Scan result type. */ __('The issue type is: %s', 'wordfence'), '<strong>' . esc_html($rule[7]) . '</strong>') . '<br>' . sprintf(/* translators: Scan result description. */ __('Description: %s', 'wordfence'), '<strong>' . esc_html($rule[3]) . '</strong>') . $extraMsg,
'data' => array_merge(array(
'realFile' => $record->realPath,
'highSense' => $options['scansEnabled_highSense']
$this->scanEngine->recordMetric('malwareSignature', $rule[0], array('file' => substr($file, 0, 255), 'match' => substr($matchString, 0, 65535), 'before' => $beforeString, 'after' => $afterString, 'md5' => $record->newMD5, 'shac' => $record->SHAC), false);
if ($forkObj->shouldFork()) {
$record->updateStoppedOn($rule[0], $currentPosition);
wordfenceMalwareScanFile::markCompleteBatch($completed);
wordfence::status(4, 'info', sprintf(/* translators: Malware signature rule ID. */ __('Forking during malware scan (%s) to ensure continuity.', 'wordfence'), $rule[0]));
$forkObj->fork(); //exits
if ($regexMatched) { break; }
if ($treatAsBinary && $options['scansEnabled_highSense']) {
if (strpos($data, $this->patterns['badstrings'][0]) !== false) {
for ($i = 1; $i < sizeof($this->patterns['badstrings']); $i++) {
if (wfUtils::strpos($data, $this->patterns['badstrings'][$i]) !== false) {
$badStringFound = $this->patterns['badstrings'][$i];
'severity' => wfIssues::SEVERITY_CRITICAL,
'ignoreP' => $record->realPath,
'shortMsg' => __('This file may contain malicious executable code: ', 'wordfence') . esc_html($record->getDisplayPath()),
'longMsg' => sprintf(/* translators: Malware signature matched text. */ __('This file is a PHP executable file and contains the word "eval" (without quotes) and the word "%s" (without quotes). The eval() function along with an encoding function like the one mentioned are commonly used by hackers to hide their code. If you know about this file you can choose to ignore it to exclude it from future scans. This file was detected because you have enabled HIGH SENSITIVITY scanning. This option is more aggressive than the usual scans, and may cause false positives.', 'wordfence'), '<span class="wf-split-word">' . esc_html($badStringFound) . '</span>'),
'data' => array_merge(array(
'realFile' => $record->realPath,
'highSense' => $options['scansEnabled_highSense']
if (!$dontScanForURLs && $options['scansEnabled_fileContentsGSB']) {
$found = $this->urlHoover->hoover($file, $data, $hooverExclusions);
$this->scanEngine->scanController()->incrementSummaryItem(wfScanner::SUMMARY_SCANNED_URLS, $found);
if ($totalRead > 2 * 1024 * 1024) {
$this->totalFilesScanned++;
if(microtime(true) - $this->lastStatusTime > 1){
$this->lastStatusTime = microtime(true);
$this->writeScanningStatus();
$shouldFork = $forkObj->shouldFork();
if ($shouldFork || count($completed) > 100) {
wordfenceMalwareScanFile::markCompleteBatch($completed);
wordfence::status(4, 'info', __("Forking during malware scan to ensure continuity.", 'wordfence'));
wordfenceMalwareScanFile::markCompleteBatch($completed);
$this->writeScanningStatus();
if ($options['scansEnabled_fileContentsGSB']) {
wordfence::status(2, 'info', __('Asking Wordfence to check URLs against malware list.', 'wordfence'));
$hooverResults = $this->urlHoover->getBaddies();
if($this->urlHoover->errorMsg){
$this->errorMsg = $this->urlHoover->errorMsg;
if ($backtrackLimit !== false) { ini_set('pcre.backtrack_limit', $backtrackLimit); }
$this->urlHoover->cleanup();
foreach($hooverResults as $file => $hresults){
$record = wordfenceMalwareScanFile::fileForPath($file);