IJUSTWANTTOGOHOME
New Pleskian
We recently had several customers running wordpress have their sites violated and used to send out spam. It looks like this was possible because their sites were filled with globally writable/executable directories and the spammer was using php code to send mail using the system mail command. I manually changed the directory permissions to stop it and had one customer who had manually installed an old version of wordpress install a new one through the Plesk control panel. He reported to me that when he created a new wordpress 3.9.1 install using the Plesk control panel it's creating a bunch of globally writable/executable directories by default. I verified this by installing wordpress on another site as well. Has anyone else seen this? I have manually changed the permissions on all the sites and removed customer access to the application install portion of the control panel for the time being, but that isn't a very good long-term solution. Is there any way to change the default permissions used on the Plesk install of wordpress to something that won't lead to future hacks almost the instant the site goes live?