What this symptom usually means
Unexpected redirects often mean the attacker has control over more than one layer. A common pattern is injected rewrite rules, an altered plugin loader, or a database option that keeps routing traffic away from the real homepage, product, or checkout URLs.
Common causes and infection vectors
Redirect hacks are often tied to vulnerable plugins, stolen admin access, or writable file paths that let the malicious redirect be re-seeded after a quick cleanup.
Risk if ignored
Redirected product and checkout traffic burns ad spend, kills trust, and can turn a malware incident into an immediate revenue leak.
What site owners should not do
Do not assume that clearing cache, replacing a single plugin, or deleting the obvious redirect rule is enough. That can suppress the symptom while the attacker still has a foothold.
Why scanner-only cleanup is often incomplete
Redirect logic can sit in MU plugins, altered theme files, scheduled tasks, or writable paths that do not show up as a single obvious infection. Real cleanup means tracing how the redirect keeps coming back.
What proper cleanup looks like
Proper cleanup means isolating modified files, removing malicious redirect logic, resetting compromised access, confirming the reinfection path is closed, and retesting key visitor flows.
What WPGuardix removes and fixes
WPGuardix removes the redirect payload, reviews the affected file groups, checks access and persistence points, and validates homepage, product, cart, and checkout behavior before handoff.
Response time and pricing context
Standard requests are answered within 2 hours during active hours. Active ecommerce emergencies are triaged within 30 minutes during active hours. Visible tier guidance lives on the money page so the pricing conversation stays aligned with the actual cleanup offer.