Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»Smart Slider updates hijacked to push malicious WordPress, Joomla versions
    Cybersecurity

    Smart Slider updates hijacked to push malicious WordPress, Joomla versions

    adminBy adminApril 9, 2026No Comments4 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    Smart Slider updates hijacked to push malicious WordPress, Joomla versions
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Smart Slider updates hijacked to push malicious WordPress, Joomla versions

    Hackers hijacked the update system for the Smart Slider 3 Pro plugin for WordPress and Joomla, and pushed a malicious version with multiple backdoors.

    The developer says that only the Pro version 3.5.1.35 of the plugin is affected and recommends switching immediately to the latest version, currently 3.5.1.36, or 3.5.1.34 and earlier.

    Apart from installing backdoors in multiple locations, the malicious update created a hidden user with administrator permissions and stole sensitive data.

    Wiz

    Smart Slider 3 for WordPress is used on over 900,000 websites for responsive slider creation via a live slider editor, featuring a large selection of layouts and designs.

    According to the vendor, the threat actor distributed the malicious update on April 7, and some websites may have installed it.

    An analysis from PatchStack, a company focusing on securing WordPress and open-source software, notes that the malware is a fully featured, multi-layered toolkit embedded in the plugin’s main file while preserving Smart Slider’s normal functionality.

    The researchers noticed that the malicious kit allows a remote attacker to execute commands without authentication via crafted HTTP headers. It also includes a second authenticated backdoor with both PHP eval and OS command execution, and automated credential theft.

    The malware achieves persistence through multiple layers, one being the creation of a hidden admin account and storing credentials in the database.

    Creating a hidden admin account
    Creating a hidden admin account
    Source: PatchStack

    Additionally, it creates a ‘mu-plugins’ directory and creates a must-use plugin with a file name that pretends to be a legitimate caching component.

    Must-use plugins are special in that they are loaded automatically, cannot be disabled from the WordPress dashboard, and are not visible in the plugins section.

    PatchStack notes that the malicious kit also plants a backdoor in the active theme’s functions.php file, which allows it to persist for as long as the theme is active.

    Another persistence layer is injecting in the wp-includes directory a a PHP file with a name that mimics a legitimate WordPress core class.

    “Unlike the other persistence layers, this backdoor does not depend on the WordPress database, but reads its authentication key from a .cache_key file stored in the same directory,” PatchStack researchers explain.

    As such, changing the database credentials does not neutralize the backdoor, which continues to work “even if WordPress fails to bootstrap fully.”

    The vendor issued a similar warning for Joomla installations, saying that the malicious code present in version 3.5.1.35 of the plugin may create a hidden admin account (usually with the prefix wpsvc_), install additional backdoors in the /cache  and /media directories, and steal site information and credentials.

    Recommended actions

    The malicious update was distributed to users on April 7, but the Smart Slider team suggests April 5 as the safest date for backup restoration, to ensure time zone differences are accounted for in all cases.

    “A security breach affected the update system responsible for distributing Smart Slider 3 Pro for WordPress,” reads the vendor’s disclosure.

    If no backup is available, it is recommended to remove the compromised plugin and install a clean version (3.5.1.36).

    Administrators who find the compromised plugin version should assume full site compromise and take the following action:

    • Delete malicious users, files, and database entries
    • Reinstall WordPress core, plugins, and themes from trusted sources
    • Rotate all credentials (WP, DB, FTP/SSH, hosting, email)
    • Regenerate WordPress security keys (salts)
    • Scan for remaining malware and review logs

    The vendor also provides a multi-step manual cleanup guide for WordPress and Joomla, which starts with getting the site into maintenance mode and backing it up.

    Admins should then clean the site of unauthorized admin users, remove all malicious components, and install all core files, plugins, and themes. Resetting all passwords and scanning for additional malware is also recommended.

    The final recommendations include hardening the site by activating two-factor authentication (2FA) protection, updating components to the latest versions, restricting admin access, and using strong passwords that are unique.


    tines

    Automated pentesting proves the path exists. BAS proves whether your controls stop it. Most teams run one without the other.

    This whitepaper maps six validation surfaces, shows where coverage ends, and provides practitioners with three diagnostic questions for any tool evaluation.

    Hijacked Joomla Malicious push Slider Smart Updates versions WordPress
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleEFF is Leaving X | Electronic Frontier Foundation
    Next Article I tried running Windows from an external drive and was surprised by how usable it is
    admin
    • Website

    Related Posts

    Fortinet fixes critical FortiSandbox vulnerabilities (CVE-2026-39813, CVE-2026-39808)

    April 16, 2026

    Cisco says critical Webex Services flaw requires customer action

    April 16, 2026

    NIST Prioritizes NVD Enrichment for CVEs in CISA KEV, Critical Software

    April 16, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    Who goes there? Your Ring doorbell can now recognise up to 50 familiar faces, and let you know if a caller is a friend or a stranger

    April 16, 2026

    COSMIC desktop surprised me, because it’s the Linux DE I’ve been waiting for

    April 16, 2026

    Fortinet fixes critical FortiSandbox vulnerabilities (CVE-2026-39813, CVE-2026-39808)

    April 16, 2026

    Search Ad Growth Slows As Social & Video Gain Faster

    April 16, 2026
    Categories
    • Blogging (63)
    • Cybersecurity (1,345)
    • Privacy & Online Earning (168)
    • SEO & Digital Marketing (824)
    • Tech Tools & Mobile / Apps (1,610)
    • WiFi / Internet & Networking (225)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    Who goes there? Your Ring doorbell can now recognise up to 50 familiar faces, and let you know if a caller is a friend or a stranger

    April 16, 2026

    COSMIC desktop surprised me, because it’s the Linux DE I’ve been waiting for

    April 16, 2026

    Fortinet fixes critical FortiSandbox vulnerabilities (CVE-2026-39813, CVE-2026-39808)

    April 16, 2026
    Most Popular
    • Who goes there? Your Ring doorbell can now recognise up to 50 familiar faces, and let you know if a caller is a friend or a stranger
    • COSMIC desktop surprised me, because it’s the Linux DE I’ve been waiting for
    • Fortinet fixes critical FortiSandbox vulnerabilities (CVE-2026-39813, CVE-2026-39808)
    • Search Ad Growth Slows As Social & Video Gain Faster
    • I’ve been using Android’s built-in focus modes wrong this whole time, and one setting fixed everything
    • Cisco says critical Webex Services flaw requires customer action
    • This one chart exposes how far Pixel has fallen behind in mobile gaming
    • NIST Prioritizes NVD Enrichment for CVEs in CISA KEV, Critical Software
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.