Magento Patch, Do your site required it

    From January, 2015 , Magento has started to got attacks, and the securities issues might be common for all the magento users, which has threatens most of the store owners, here we have come below with the symptoms, which might come if there is any security issue on your Magento server  –


Recommend that you look for the following signs to determine if your site has potentially been compromised:

  • Check your list of administrator users for unknown accounts. We have seen vpwq and defaultmanager being used, but any unknown account is suspicious
  • Check your Magento installation for any unknown files that were recently created and are suspicious. Compare all files to your code repository or staging server.
  • Check server access log files for request POST /index.php/admin/Cms_Wysiwyg/directive/index/ coming from unknown IP addresses.
  • Run a tool to check for trojans (e.g. chkrootkit)
  • Check for wrong permissions
  • Check for hidden files
  • Check for suspicious ports being opened (command: netstat -nap | grep LISTEN )
  • Check for any port redirections on OS level (sample command: iptables -L -n)

If you suspect that the site is compromised, contact the security department of your hosting company for an audit.


If you have several sites to check or you simply prefer to use our API, send a request like this:

$ curl{domain}/{admin path}

Optionally, you can force the API to check in https mode:

$ curl{domain}/{admin path}/https

Finally, if your admin path is more than one level deep, replace slashes with exclamation points, like this:

# /my/long/admin/path becomes:
$ curl{domain}/my\!long\!admin\!path


While a large number of merchants have successfully downloaded the patch, many still have not done so. Please act now to ensure that your Magento store is secure!

Community Edition Patches: