Sounds like one or more of your scripts may do an include/require using user input that is not sufficiently filtered/validated, while the server configuration allows includes via URL, making it possible to have your script run any PHP code a malicious user supplies to your script.
As an immediate fix while trying to narrow down the precise flaw(s), I would suggest turning off the allow_url_include configuration setting.