Malware Detected Webhook

Malware Detected Webhook

When a daily scan results in file or page malware for a Website, the details will be sent via webhook. See the Webhook Events Overview for more general information.

ID: Webhook ID
Event: website_malware_issue_found
Target: Includes unqiue Website ID as id
Body: A report with an array of type and description pairs and a report_date with the time the report was generated in ISO 8601 format. The description is an English, human-readable message describing what was found or referencing a specific file or page on the website.

Example

{
   "id":123456,
   "event":"website_malware_issue_found",
   "target":{
      "type":"Website",
      "id":123456
   },
   "body":{
      "report_date":"2020-08-14",
      "report":[
         {
            "type":"Malware Page",
            "description":"http://www.vulnerablesite.com/abadpage.php"
         },
         {
            "type":"Platform Vulnerability",
            "description":"WordPress 2.9.2-4.8.1 - Open Redirect -- Open redirect attack possible on User and Term edit screens."
         },
         {
            "type":"Platform Vulnerability",
            "description":"WordPress 2.5-4.6 - Authenticated Stored Cross-Site Scripting via Image Filename -- Authenticated Stored Cross-Site Scripting vulnerability via Image Filename in WordPress versions 2.5 to 4.6 allows authenticated users to inject malicious code to the database."
         },
         {
            "type":"Platform Vulnerability",
            "description":"WordPress 4.2-4.7.2 - Press This CSRF DoS -- CSRF DoS vulnerability in WordPress versions 4.2 to 4.7.2 through the Press This functionality."
         },
         {
            "type":"Malware File",
            "description":"public_html/tomsaplustreeservice/wp-admin/maint/repair.php"
         },
         {
            "type":"Malware File",
            "description":"public_html/2014backup/administrator/help/en-GB/screen.modules.new.html"
         },
         {
            "type":"Malware File",
            "description":"tmp/xploit.sh"
         }
      ]
   }
}