CyberHappenings logo

Track cybersecurity events as they unfold. Sourced timelines. Filter, sort, and browse. Fast, privacy‑respecting. No invasive ads, no tracking.

Backdoor in EssentialPlugin WordPress suite leads to infected wp-config.php via malicious updates

First reported
Last updated
1 unique sources, 1 articles

Summary

Hide ▲

A backdoor implanted in over 30 WordPress plugins distributed as part of the EssentialPlugin suite allowed attackers to push malware to websites running affected plugins. The compromise originated from a malicious code injection introduced after the project’s acquisition in August 2025, which remained dormant until recently activated via updates. The malware injected malicious code into wp-config.php and generated spam pages or redirects visible only to search engine crawlers such as Googlebot. The attack leveraged a command-and-control (C2) server using Ethereum-based address resolution for evasion. WordPress.org responded by forcibly removing the plugins and issuing updates to neutralize the backdoor’s communication channels.

Timeline

  1. 15.04.2026 23:33 1 articles · 3h ago

    Malicious update in EssentialPlugin suite triggers backdoor-driven malware injection in WordPress sites

    A dormant backdoor planted in EssentialPlugin’s suite of over 30 WordPress plugins—introduced after the project’s acquisition in August 2025—was activated via updates, enabling unauthorized code execution and wp-config.php infection. The malware fetched malicious payloads from a C2 server using Ethereum-based resolution, generating cloaked spam and redirects visible only to crawlers. WordPress.org issued forced updates to disable the backdoor’s execution path and neutralize live C2 communication, but did not clean infected wp-config.php files.

    Show sources

Information Snippets