A threat actor purchased a portfolio of 30+ popular WordPress plugins and secretly inserted a backdoor into their code. The malicious code was added shortly after acquisition but remained dormant for about 8 months, avoiding detection.

In April 2026, the backdoor was activated across all affected plugins, allowing attackers to:

  • Remotely execute code on infected websites

  • Inject hidden SEO spam into core files (like wp-config.php)

  • Maintain persistent, hard-to-detect access

If you're using WordPress, it may be worth taking a few precautionary steps:

  • Review all installed plugins and remove anything unnecessary or outdated

  • Check for recent updates from plugin developers and apply patches promptly

  • Monitor for unusual behavior, such as unexpected admin users or traffic spikes

  • Ensure backups are current and can be restored if needed

Send me a message