Cleansed site still vulnerable via CMS.

See: http://killmalware.com/inbogavlc.com/#
WP issues: WordPress Plugins
The following plugins were detected by reading the HTML source of the WordPress sites front page.

all-in-one-seo-pack latest release (2.2.7.2)
http://semperfiwebdesign.com
jquery-masonry-image-gallery 3.0 latest release (3.0)
http://willrees.com/2013/02/jquery-masonry-and-native-wordpress-image-galleries/
asesor-cookies-para-la-ley-en-espana 0.21 latest release (0.21)
http://webartesanal.com
advanced-post-slider 2.3.4 latest release (2.3.4)
http://www.wpcue.com
contact-form-7 4.2.2 latest release (4.3) Update required
http://contactform7.com/ → http://www.domxssscanner.com/scan?url=http%3A%2F%2Fwww.inbogavlc.com%2Fwp-content%2Fplugins%2Fcontact-form-7%2Fincludes%2Fjs%2Fjquery.form.min.js%2Cqver%3D3.51.0-2014.06.20.pagespeed.jm.RVBOol6lkO.js Cross Site Request Forgery Vulnerability detected.

Warning User Enumeration is possible
The first two user ID’s were tested to determine if user enumeration is possible.

ID User Login
1 None inboga
2 None adrmin

Linked script:
-http://www.inbogavlc.com/wp-includes/js/jquery/jquery.js,qver=1.11.3.pagespeed.jm.zixJPNMRNN.js
-http://www.inbogavlc.com/wp-content/plugins/contact-form-7/includes/js/jquery.form.min.js,qver=3.51.0-2014.06.20.pagespeed.jm.RVBOol6lkO.js

IP issues: https://www.virustotal.com/nl/ip-address/167.114.173.17/information/

Re: https://sitecheck.sucuri.net/results/inbogavlc.com/#sitecheck-details