WordPress Core files integrity check

My plugin can now scan your WordPress Core files and compare them with the installation source code available from wordpress.org. This new integrity check could be very helpful for finding new threats hidden in WP Core file. There may be lots reasons, other than malicious threats, for Core files to differ from the original source so this is an optional fix that requires you to check the box next to each file you want to restore. If a Know Threat is found in these files it will still come up as an automatic fix but if not you can now optionally revert any of these modified Core files to the original code.

This new feature is currently only available to those who have donated at the default $29+ level.

Tags: ,

15 Comments on "WordPress Core files integrity check"

  • On April 24, 2021 at 1:42 am, Diuliano da Silva Oliveira said:

    When donating 29, do I have the core resource released to use as many times as necessary on all my sites?

    • On April 26, 2021 at 3:19 am, Anti-Malware Admin said:

      Yes, your donation will unlock the automatic update feature on all your sites, and that will install the core file definitions to each one once the automatic updates is enabled.

  • On July 18, 2020 at 4:04 am, Nicolas Vanhoucke said:

    great plugin , just donated ! it ‘s worht every penny and more

  • On February 9, 2020 at 11:13 am, işitme cihazı said:

    thanks very god pluging wordpress

  • On May 3, 2019 at 2:44 am, Joe said:

    This is a great idea. ‘d also love to see it generate a list of ‘extra’ files in the root, admin and includes areas because that’s where I see some wicked stuff inserted.

    Also, and I’m sure you’ve got this covered, php files in content/uploads always needs checked. Backup Buddy puts them in uploads legitimately but it’s pretty rare that they should be there otherwise.

    • On May 4, 2019 at 1:57 pm, Anti-Malware Admin said:

      I have tried these ideas before which caused a lot of alarm and generated more questions about safe files than I could reasonably manage. You would be surprised how often these two circumstances occur in the wild. I have kept this need in mind though, and I am thinking about a way to reintroduce these features without causing wide-spread panic.

      • On May 7, 2019 at 2:34 am, Joe said:

        I admit, I’m not really sure about this, but other than adding something like a robots.txt or sitemap files in the root dir, shouldn’t wp-includes and wp-admin always = the core comparison?

        • On May 11, 2019 at 3:37 pm, Anti-Malware Admin said:

          I thought the same thing until I tried it and found out that there are actually lots of legitimate additions to these directories. That’s why I fell back on simply validating the checksums in the files that I know are supposed to be there and just scanning the additional files in the same way that all other unknown files are scanned.

  • On January 23, 2019 at 4:08 am, bipolar disorder said:

    Hello there! I have a question! Is this option not free, right? Do we have to pay for this new feature?

    • On January 23, 2019 at 1:43 pm, Anti-Malware Admin said:

      The Core Files definitions are only available with the Automatic Update feature at this time. So you would need to make a donation of $29+ to enable the Automatic Updates, and then the Core Files definitions will be installed.

  • On March 20, 2017 at 1:38 am, pooja Chauhan said:


    Thanks, for sharing some tips for WordPress Core files integrity check .

  • On April 2, 2016 at 6:57 am, Noah Weir said:


    Is there anyway I could get a version of this that can run via command line?

    • On April 2, 2016 at 7:24 am, Anti-Malware Admin said:

      I’m working on that highly requested feature now but it is not finished yet. I will let you know when I have a script that is ready for BETA testing ;-)

      • On April 2, 2016 at 7:27 am, Noah Weir said:

        Awesome, I figured it was highly requested. I’m an admin with Liquid Web and love your plugin. Pushing to have this widely used possibly by us. Do you currently have any hosts using your product?

        • On April 2, 2016 at 9:17 am, Anti-Malware Admin said:

          My target audience has been those site owners who don’t have the skills or tools to combat hackers attacking their own site, but it is inevitable that more and more server admins are getting involved, and they need a more coarse and robust set of tools that are not dependent on an API infrastructure like WordPress. I am currently working on a script that leverages the existing definitions of know threat that I have worked so hard to produce and maintain, that can also be run at the command line or scheduled in your crontab.


Leave a Reply

Your email address will not be published. Required fields are marked *


You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>