Someone planted backdoors in dozens of WordPress plugins used in thousands of websites

1 day ago 4
A stylized WordPress logo.Image Credits:Bryce Durbin / TechCrunch

11:31 AM PDT · April 14, 2026

Dozens of plugins for the wide utilized unfastened root web blogging bundle WordPress are present offline aft a backdoor was discovered successful them, utilized to propulsion malicious codification to immoderate website that relied connected the plugins. The backdoor was discovered aft a caller firm proprietor bought these plug-ins.

Anchor Hosting laminitis Austin Ginder sounded the alarm in a blog station past week describing a proviso concatenation onslaught connected a WordPress plugin shaper called Essential Plugin. Ginder said idiosyncratic past twelvemonth bought Essential Plugin and the backdoor was soon added to the plugins’ root code. The backdoor sat dormant until earlier this period erstwhile it activated and began distributing malicious codification to immoderate website with the plugins installed.

Essential Plugin says connected its website that it has implicit 400,000 plugin installs and much than 15,000 customers. WordPress’s plugin instal leafage says the affected plugins are successful implicit 20,000 progressive WordPress installations.

Plugins let owners of WordPress-based websites to widen the site’s functionality, but successful doing truthful assistance the plugins entree to their installations, which tin unfastened these websites to malicious extensions and imaginable compromise. But Ginder warned that WordPress users are not notified of immoderate plugins’ alteration successful ownership, exposing users to imaginable takeover attacks by their caller owners.

According to Ginder, this is the second hijack of a WordPress plugin discovered successful arsenic galore weeks. Security researchers person long warned of the risks of malicious actors buying bundle and changing its codification successful bid to compromise a ample fig of computers astir the world.

While the plugins have been removed from WordPress’ directory and present database their closure arsenic “permanent,” Ginder warned that WordPress owners should cheque if they inactive person 1 of the malicious plugins installed and region it. Ginder has a database of the affected plugins in the blog post.

Representatives for Essential Plugin did not respond to a petition for comment.

Zack Whittaker is the information exertion astatine TechCrunch. He besides authors the play cybersecurity newsletter, this week successful security.

He tin beryllium reached via encrypted connection astatine zackwhittaker.1337 connected Signal. You tin besides interaction him by email, oregon to verify outreach, astatine zack.whittaker@techcrunch.com.

Read Entire Article