Malicious self-update mechanism in Quick Page/Post Redirect plugin exposed dormant backdoor in WordPress environments
Summary
Hide ▲
Show ▼
A dormant backdoor mechanism was discovered in the Quick Page/Post Redirect WordPress plugin, installed on over 70,000 websites. The backdoor, introduced via compromised plugin versions (5.2.1 and 5.2.2) released between 2020 and 2021, included a hidden self-update system that fetched arbitrary code from a third-party domain (anadnet[.]com). This allowed silent code injection into sites, primarily for SEO spam targeting logged-out users. The backdoor activation mechanism remains dormant on impacted sites due to the command-and-control domain's current lack of resolution, but the self-update capability could enable further exploitation. WordPress.org has temporarily removed the plugin pending review, and users are advised to uninstall the plugin and replace it with a clean version once available.
Timeline
-
30.04.2026 01:13 1 articles · 1h ago
Dormant backdoor in Quick Page/Post Redirect plugin revealed via malicious self-update mechanism
Analysis confirmed that compromised versions 5.2.1 and 5.2.2 of the Quick Page/Post Redirect WordPress plugin contained a hidden self-update system that fetched updates from anadnet[.]com. This allowed silent delivery of a tampered version 5.2.3 in March 2021, containing a passive backdoor triggered only for logged-out users to inject SEO spam. The malicious self-updater was removed from subsequent versions in February 2021 before review, but the backdoor mechanism remains dormant on impacted sites due to the unresolvable command-and-control domain. The plugin has been temporarily removed from WordPress.org pending review, and users are advised to uninstall it and replace it with a clean version (5.2.4) when available.
Show sources
- Popular WordPress redirect plugin hid dormant backdoor for years — www.bleepingcomputer.com — 30.04.2026 01:13
Information Snippets
-
The Quick Page/Post Redirect plugin (versions 5.2.1 and 5.2.2) introduced a hidden self-update mechanism that fetched updates from an external domain (anadnet[.]com) outside WordPress.org's control.
First reported: 30.04.2026 01:131 source, 1 articleShow sources
- Popular WordPress redirect plugin hid dormant backdoor for years — www.bleepingcomputer.com — 30.04.2026 01:13
-
The malicious self-updater was removed from subsequent plugin versions in February 2021 before code reviewers could analyze it.
First reported: 30.04.2026 01:131 source, 1 articleShow sources
- Popular WordPress redirect plugin hid dormant backdoor for years — www.bleepingcomputer.com — 30.04.2026 01:13
-
In March 2021, sites running versions 5.2.1 and 5.2.2 silently received a tampered version 5.2.3 from the external server, containing a passive backdoor that triggered only for logged-out users.
First reported: 30.04.2026 01:131 source, 1 articleShow sources
- Popular WordPress redirect plugin hid dormant backdoor for years — www.bleepingcomputer.com — 30.04.2026 01:13
-
The backdoor payload was designed to fetch data from 'anadnet' servers, primarily for SEO spam operations, and had a different hash than the official WordPress.org version of plugin 5.2.3.
First reported: 30.04.2026 01:131 source, 1 articleShow sources
- Popular WordPress redirect plugin hid dormant backdoor for years — www.bleepingcomputer.com — 30.04.2026 01:13
-
The self-update mechanism enabling arbitrary code execution remains present on impacted sites but is currently dormant due to the unresolvable 'anadnet' subdomain.
First reported: 30.04.2026 01:131 source, 1 articleShow sources
- Popular WordPress redirect plugin hid dormant backdoor for years — www.bleepingcomputer.com — 30.04.2026 01:13
-
WordPress.org has temporarily pulled the Quick Page/Post Redirect plugin from its directory pending a review.
First reported: 30.04.2026 01:131 source, 1 articleShow sources
- Popular WordPress redirect plugin hid dormant backdoor for years — www.bleepingcomputer.com — 30.04.2026 01:13
-
The plugin is installed on over 70,000 WordPress sites, with an active update check still pointing to the 'anadnet' server.
First reported: 30.04.2026 01:131 source, 1 articleShow sources
- Popular WordPress redirect plugin hid dormant backdoor for years — www.bleepingcomputer.com — 30.04.2026 01:13