Wednesday, April 15, 2026

WordPress plugin suite hacked to push malware to hundreds of web sites

WordPress plugin suite hacked to push malware to hundreds of web sites

Greater than 30 WordPress plugins within the EssentialPlugin package deal have been compromised with malicious code that permits unauthorized entry to web sites operating them.

A malicious actor planted the backdoor code final 12 months however solely lately began pushing it to customers by way of updates, producing spam pages and inflicting redirects, as per the directions acquired from the command-and-control (C2) server.

The compromise impacts plugins with a whole bunch of hundreds of energetic installations and was noticed by Austin Ginder, the founding father of managed WordPress internet hosting supplier Anchor Internet hosting, after receiving a tip about one add-on containing code that allowed third-party entry.

Wiz

Additional investigation by Ginder revealed {that a} backdoor had been current in all plugins inside the EssentialPlugin package deal since August 2025, after the challenge was acquired in a six-figure deal by a brand new proprietor.

EssentialPlugin, established in 2015 as WP On-line Help and rebranded in 2021, is a WordPress growth agency providing sliders, galleries, advertising instruments, WooCommerce extensions, search engine optimisation/analytics utilities, and themes.

In keeping with Ginder, the backdoor sat inactive till it was lately activated and silently contacted exterior infrastructure to fetch a file (‘wp-comments-posts.php’) that injects malware into ‘wp-config.php.’

The downloaded malware is invisible to website homeowners and makes use of Ethereum-based C2 tackle decision for evasion. Relying on the acquired directions, the malware can retrieve “spam hyperlinks, redirects, and faux pages”.

“The injected code was refined. It fetched spam hyperlinks, redirects, and faux pages from a command-and-control server. It solely confirmed the spam to Googlebot, making it invisible to website homeowners,” defined Ginder.

Evaluation from WordPress safety platform PatchStack reveals that the backdoor labored provided that the ‘analytics.essentialplugin.com’ endpoint returned with a malicious serialized content material.

WordPress motion and an infection standing

WordPress.org responded rapidly to the studies of the malicious exercise by closing the plugins and pushing a pressured replace to web sites to neutralize the backdoor’s communication and disable its execution path.

Nevertheless, the builders warned that the motion didn’t clear the wp-config core configuration file, which connects web sites to their databases and consists of vital settings.

The WordPress.org Plugins Staff additionally cautioned directors with web sites operating an EssentialPlugin product that whereas one recognized location for the backdoor is a file named wp-comments-posts.php, which resembles the authentic wp-comments-post.php, the malware may conceal in different information.

BleepingComputer has contacted EssentialPlugins for a touch upon the reported malicious commit that occurred after the acquisition, however now we have not acquired a response by publishing time.

Automated pentesting proves the trail exists. BAS proves whether or not your controls cease it. Most groups run one with out the opposite.

This whitepaper maps six validation surfaces, reveals the place protection ends, and offers practitioners with three diagnostic questions for any device analysis.

Related Articles

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest Articles