Since around the 25th of May there's been a constant barrage of malware affecting my customer sites. I've upgraded to PHP 7.4.33 and upgraded all the sites to v2.2.16. Changed all the login passwords. Updated CKEditor that's used by a page in the admin area. Set everything bar the /tmp folder read-only. Still happening. So I'm guessing its a file upload or RCE type of vulnerability being exploited to download and install malware.
Installation of the malware doesn't generate anything in the IIS logs around the time of the files being modified. Installation creates/modifies the index.php files (not just the main index.php) and inserts a PHP include line (surrounded by PHP comment blocks) to a file that's been installed somewhere on the site. Never in the same place. Always ends in a .inc. Is heavily obfuscated code that even malwaredecoder.com doesn't really help with demystifying.
I've come across a couple of open exploits. Looking at the CMSMS bug tracker it could be that Smarty related one? Otherwise I'm guessing it is file manager/file picker or FCKEditorX vulnerability.
I don't use many modules, just the basics.... FormBuilder, CGExtensions, MenuManager. And a CKEditor which I've updated to the latest 4.x version.
Has anyone got some ideas on what else I can do to mitigate against this?
My server is running IIS so I can't use ModSecurity.
TBH seems like moving to a hosting solution with ModSecurity or other such stuff is the only way forward. My customers are getting kinda annoyed and embarrassed. Especially when Google starts warning people about visiting the website

Any help appreciated. Thank you.
If there's some open bugs that need squashing I could help with development.