WPScan.org

WordPress Backdoor & Shell Scanner

After a WordPress site is compromised, attackers plant backdoors to maintain access even after you change passwords. These are usually PHP files with names like wp-info.php or hidden inside plugin folders, and they respond to secret POST requests with file management, command execution, or database access. WP Scan detects the code patterns used in these shells regardless of filename.

What WP Scan detects

  • PHP shells using system(), exec(), passthru(), or shell_exec()
  • Backdoors triggered by secret POST parameter checks
  • Base64/gzip-encoded payloads that decode at runtime
  • assert() and preg_replace() /e modifier code execution
  • File manager capabilities hidden in WordPress files
  • C99, r57, WSO and other known web shell code signatures

Scan your WordPress files now — free

Drop your ZIP here

or click to browse · up to 20 MB free

Want to see what a Premium report looks like?

View a real scan with line numbers, fix guides, and secure code for every finding.

View sample report →

Common questions

See exact line numbers and fix guides for every finding

Upgrade to Premium — from $7.99/mo →