Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Security Flaw in WordPress Plugin Uncovered After Years

Security Flaw in WordPress Plugin Uncovered After Years

Posted on April 30, 2026 By CWS

A significant security breach within the Quick Page/Post Redirect Plugin, a widely used WordPress plugin, has been identified. This plugin, which boasts over 70,000 active installations, has been compromised by a backdoor that has remained hidden for several years.

Discovery of the Security Breach

Security expert Austin Ginder uncovered the malicious activity, which had been dormant for five years. This backdoor was capable of injecting unauthorized code into websites without detection. By utilizing a custom update mechanism, the plugin was transformed into a tool for unauthorized SEO manipulation and remote execution of code.

Details of the Plugin Compromise

The issue came to light during routine security checks when anomalies were detected in plugin version 5.2.3. Although sites reported using this version, discrepancies in file hashes revealed tampered files. These files contained an unauthorized function that communicated with an external server, injecting content into web pages without administrator knowledge.

The hidden code specifically avoided detection by administrators, activating only for ordinary users and search engine bots. The complex attack involved two backdoors: an active one using a manipulated plugin update checker and a passive one that fetched hidden content from a remote server.

Origins of the Attack and Response

The attack was linked to the plugin’s original developer, anadnet, who introduced the malicious updater to the official repository in 2020. This allowed the compromised code to spread widely before being quietly removed from the source code. However, the installations remained connected to the attacker’s infrastructure.

The WordPress plugin review team has temporarily removed the Quick Page/Post Redirect Plugin from the directory for further investigation. Conventional vulnerability scanners often miss such sophisticated supply chain attacks due to version number spoofing.

To safeguard against these threats, administrators are advised to verify plugin integrity using WordPress’s command-line tools. Any discrepancies should prompt immediate uninstallation and replacement with secure alternatives.

Stay updated on cybersecurity developments by following us on Google News, LinkedIn, and X. Reach out to us for story features.

Cyber Security News Tags:backdoor attack, cyber threat, Cybersecurity, malicious code, plugin backdoor, plugin vulnerability, remote code execution, security audit, SEO manipulation, supply chain attack, website compromise, website protection, website security, WordPress plugin, WordPress security

Post navigation

Previous Post: Supply Chain Attack Compromises Popular Python Package

Related Posts

APT35 Hackers Attacking Government, Military Organizations to Steal Login Credentials APT35 Hackers Attacking Government, Military Organizations to Steal Login Credentials Cyber Security News
Ransomware Campaign Mimics Akira in South America Ransomware Campaign Mimics Akira in South America Cyber Security News
Threat Actors Combine Android Malware With Click Fraud Apps to Steal Login Credentials Threat Actors Combine Android Malware With Click Fraud Apps to Steal Login Credentials Cyber Security News
Disney Agreed to Pay  Million for Collection Personal Data From Children Disney Agreed to Pay $10 Million for Collection Personal Data From Children Cyber Security News
Critical Flaws in Atlassian Bamboo Demand Urgent Patching Critical Flaws in Atlassian Bamboo Demand Urgent Patching Cyber Security News
New Gmail Phishing Attack With Weaponized Login Flow Steals Login Credentials New Gmail Phishing Attack With Weaponized Login Flow Steals Login Credentials Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Security Flaw in WordPress Plugin Uncovered After Years
  • Supply Chain Attack Compromises Popular Python Package
  • AI Propels Cybercrime with Rapid Attack Deployment
  • Zero Trust Guidelines for Protecting Industrial Systems
  • Anthropic Launches Claude Security to Combat AI Exploit Threats

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Security Flaw in WordPress Plugin Uncovered After Years
  • Supply Chain Attack Compromises Popular Python Package
  • AI Propels Cybercrime with Rapid Attack Deployment
  • Zero Trust Guidelines for Protecting Industrial Systems
  • Anthropic Launches Claude Security to Combat AI Exploit Threats

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark