Get all your news in one place.
100's of premium titles.
One app.
Start reading
TechRadar
TechRadar
Sead Fadilpašić

WordPress websites under attack — expert report says dozens of plugins hijacked to target thousands of sites

Person editing a WordPress site.
  • Malicious actor bought 31 WordPress plugins from Essential Plugin
  • Updates injected backdoors, granting full site access
  • Spam campaigns hidden from owners, C2 resolved via Ethereum smart contract

A hacker bought more than 30 legitimate WordPress plugins and abused their good standing to infect tens of thousands of websites with backdoors.

Austin Ginder, founder of Anchor Hosting, reported how a client recently alerted him of a known plugin suddenly allowing unauthorized third-party access. The investigation led him to a somewhat troubling discovery: a company that developed 31 WordPress plugins, both free and premium versions, was sold in early 2025, to a person calling themselves “Kris”.

That person then added malicious code to all plugins and pushed the update to the WordPress websites actively using them.

Injecting sophisticated code

The malicious company is called Essential Plugin, and claims its products have been installed more than 400,000 times and were being actively used by more than 15,000 customers. The official WordPress repository shows more than 20,000 active WordPress installations.

The malware was essentially a backdoor that granted the attacker full access to the websites. The goal seems to have been to propagate existing spam campaigns:

“The injected code was sophisticated,” Ginder explained. “It fetched spam links, redirects, and fake pages from a command-and-control server. It only showed the spam to Googlebot, making it invisible to site owners. And here is the wildest part. It resolved its C2 domain through an Ethereum smart contract, querying public blockchain RPC endpoints. Traditional domain takedowns would not work because the attacker could update the smart contract to point to a new domain at any time.”

The full list of compromised plugins can be found on this link. If you are using any of these, it would be wise to replace them with a safer alternative. Ginder also shared a patching method on his blog.

In the meantime, WordPress removed all of the malicious plugins from the repository.

Via TechCrunch

Sign up to read this article
Read news from 100's of titles, curated specifically for you.
Already a member? Sign in here
Related Stories
Top stories on inkl right now
One subscription that gives you access to news from hundreds of sites
Already a member? Sign in here
Our Picks
Fourteen days free
Download the app
One app. One membership.
100+ trusted global sources.