Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Compromised Update Impacts Smart Slider 3 Pro Plugin

Compromised Update Impacts Smart Slider 3 Pro Plugin

Posted on April 10, 2026 By CWS

Unknown attackers have exploited the update mechanism of the Smart Slider 3 Pro plugin for WordPress and Joomla, distributing a compromised version embedded with a backdoor. This incident affects version 3.5.1.35 of Smart Slider 3 Pro for WordPress, as reported by WordPress security firm Patchstack. The plugin boasts over 800,000 active installations in its free and Pro formats.

Details of the Security Breach

Nextend, the company behind the plugin, confirmed that unauthorized individuals infiltrated their update infrastructure, releasing an attacker-modified build via the official update channel. Any website that upgraded to version 3.5.1.35 within six hours of its release on April 7, 2026, was at risk of receiving a fully functional remote access toolkit.

The injected malware allows for the creation of unauthorized admin accounts and the execution of remote system commands via HTTP headers. It also facilitates arbitrary PHP code execution through concealed request parameters.

Technical Capabilities of the Malware

The backdoor provides pre-authenticated remote code execution capabilities using custom HTTP headers, such as X-Cache-Status and X-Cache-Key, the latter passing code to “shell_exec()”. It supports dual execution modes, executing PHP code and operating system commands on the compromised server. Furthermore, it creates hidden admin accounts, making them invisible to legitimate administrators by altering specific WordPress filters.

Persistence is achieved by installing the backdoor in multiple locations, including a must-use plugin disguised as a caching component, and appending malicious code to the active theme’s “functions.php” file. Additionally, it stores data such as the site URL, secret backdoor key, and admin credentials to a command-and-control domain.

Recommendations for Affected Users

Patchstack highlights the sophistication of the malware, emphasizing its multi-layered persistence and resilience. Notably, the free version of the plugin remains unaffected. In response, Nextend has deactivated its update servers, removed the malicious version, and initiated a comprehensive investigation.

Users are advised to update to version 3.5.1.36 immediately and undertake specific cleanup actions. This includes identifying and removing suspicious admin accounts, uninstalling the affected plugin version, and deleting persistence files and malicious WordPress options. It’s also recommended to reset passwords, review site logs for unauthorized changes, and enable two-factor authentication for enhanced security.

Patchstack describes the event as a classic supply chain compromise, illustrating the challenges traditional security measures face when malware is delivered through trusted channels.

The Hacker News Tags:Backdoor, Cybersecurity, Joomla security, malicious update, Malware, Nextend, Patchstack, persistent backdoor, plugin update, remote access toolkit, Smart Slider 3 Pro, supply chain attack, website security, WordPress plugin, WordPress security

Post navigation

Previous Post: AWS Addresses Major Security Flaws in RES Platform
Next Post: Chrome Enhances Security with New Cookie Protection

Related Posts

Russian Ransomware Gangs Weaponize Open-Source AdaptixC2 for Advanced Attacks Russian Ransomware Gangs Weaponize Open-Source AdaptixC2 for Advanced Attacks The Hacker News
Ivanti Zero-Day Vulnerability Impacts Dutch and EU Agencies Ivanti Zero-Day Vulnerability Impacts Dutch and EU Agencies The Hacker News
38,000+ FreeDrain Subdomains Found Exploiting SEO to Steal Crypto Wallet Seed Phrases 38,000+ FreeDrain Subdomains Found Exploiting SEO to Steal Crypto Wallet Seed Phrases The Hacker News
Linux AppArmor Vulnerabilities Risk Root Escalation Linux AppArmor Vulnerabilities Risk Root Escalation The Hacker News
Self-Spreading ‘GlassWorm’ Infects VS Code Extensions in Widespread Supply Chain Attack Self-Spreading ‘GlassWorm’ Infects VS Code Extensions in Widespread Supply Chain Attack The Hacker News
Pre-Auth Exploit Chains Found in Commvault Could Enable Remote Code Execution Attacks Pre-Auth Exploit Chains Found in Commvault Could Enable Remote Code Execution Attacks The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • MITRE Unveils Comprehensive Fraud Prevention Framework
  • Malicious OpenVSX Extension Infects Multiple Code Editors
  • Marimo Vulnerability Exploited Quickly After Disclosure
  • Google Enhances Chrome Security with DBSC Rollout
  • CPUID Site Delivers Compromised CPU-Z and HWMonitor Tools

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • MITRE Unveils Comprehensive Fraud Prevention Framework
  • Malicious OpenVSX Extension Infects Multiple Code Editors
  • Marimo Vulnerability Exploited Quickly After Disclosure
  • Google Enhances Chrome Security with DBSC Rollout
  • CPUID Site Delivers Compromised CPU-Z and HWMonitor Tools

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark