Hi Paolo & associates,
I noticed a similar Post: #43193 and your response. Do you believe my issue is the same case of “trying to perform micro-surgery with a steak knife”?
Here is the Wordfence Message and offending file attached.
This file may contain malicious executable code:
Filename:
wp-content/themes/GeoDirectory_framework/options/ReduxCore/inc/fields/ace_editor/vendor/mode-php.js
File type: Not a core, theme or plugin file.
Issue first detected: 12 hours 26 mins ago.
Severity: Critical
Status New
This file is a PHP executable file and contains an eval() function and base64() decoding function on the same line. This is a common technique used by hackers to hide and execute code. If you know about this file you can choose to ignore it to exclude it from future scans.
Do you recommend, running Sucuri Scan on it, then marking it to be ignored/fixed if no issues found?
Thanks for your assistance.