Malware

Smart Slider 3 Pro Plugin Backdoored via Supply Chain Attack — 800,000+ Sites at Risk

dark6 11 April 2026
Cybersecurity lock representing a supply chain attack on WordPress plugin
Read Time:3 Minute, 30 Second

In one of the most alarming software supply chain compromises of 2026, threat actors successfully hijacked the update infrastructure of Smart Slider 3 Pro — a widely used WordPress and Joomla slider plugin — and distributed a fully backdoored version to over a million websites worldwide. The incident, which unfolded on April 7–8, 2026, is a stark reminder of the growing risk posed by supply chain attacks targeting the web development plugin ecosystem.

How the Attack Unfolded

Attackers gained unauthorized access to the update servers operated by Nextend, the Hungarian company behind Smart Slider 3. Once inside the infrastructure, they replaced the legitimate plugin build with a weaponized version — Smart Slider 3 Pro 3.5.1.35 — and pushed it through official update channels. Any WordPress or Joomla site that applied the update between its release and its detection approximately six hours later received a fully armed remote access toolkit.

The attack was particularly insidious because it arrived through a trusted, signed update channel — bypassing the traditional file integrity checks used by many security plugins. Site administrators who applied routine plugin updates, a widely recommended security best practice, were unwittingly installing malware on their production servers.

What the Backdoor Can Do

Cybersecurity researchers at Patchstack conducted a deep malware analysis of the compromised version and identified multiple distinct malicious components embedded within the plugin code:

  • Unauthenticated Remote Code Execution: The backdoor accepts crafted HTTP headers to execute arbitrary commands on the web server without requiring any credentials whatsoever.
  • Authenticated Secondary Backdoor: A second, more persistent backdoor implements both PHP eval and OS command execution, ensuring continued access even if the primary entry point is discovered and removed.
  • Credential and Payment Data Theft: A third component intercepts database operations, logging sensitive information — including user passwords, payment card details, and personal data — and transmitting it silently to external command-and-control (C2) servers.

Scope and Impact

Smart Slider 3 boasts more than 800,000 active installations across its free and Pro editions on WordPress alone, with additional deployments across Joomla-based websites. Only the Pro (paid) version was affected; the free version distributed via WordPress.org was not tampered with.

While the malicious version was available for approximately six hours, the consequences for affected sites can be severe and long-lasting. Any site running version 3.5.1.35 should be considered fully compromised until thoroughly remediated, as attackers may have already established persistent access, exfiltrated sensitive data, or implanted additional secondary payloads that survive a simple plugin update.

Remediation Steps

Nextend released a clean update — version 3.5.1.36 — which removes the malicious code. However, simply updating the plugin is not sufficient for sites that ran version 3.5.1.35. The security community recommends the following remediation steps:

  • Restore from a clean server backup taken before April 5, 2026 (accounting for time zone differences, use April 4 or earlier to be safe).
  • If a rollback is not feasible, update immediately to 3.5.1.36 and conduct a thorough forensic investigation of the server environment.
  • Rotate all credentials stored on or accessed from the affected server, including database passwords, API keys, and all user account credentials.
  • Review web server access logs for unusual HTTP requests, especially those containing the crafted headers used by the backdoor’s RCE mechanism.
  • Scan for additional persistence mechanisms — web shells, modified core files, or new scheduled tasks — that attackers may have planted during the exposure window.

The Bigger Picture: Supply Chain Security

This incident is the latest in a growing wave of high-profile supply chain attacks targeting the web development ecosystem. Similar incidents in recent years have compromised npm packages, PyPI libraries, and commercial software update mechanisms. The Smart Slider 3 attack demonstrates that even established, commercial paid plugins distributed through official vendor infrastructure are not immune to supply chain compromise.

Security experts strongly recommend that organizations implement robust software composition analysis (SCA) tools, monitor for unexpected file changes after any plugin update, and consider implementing staging environments to review updates before deploying them to production. Plugin vendors, for their part, must invest in hardening their build and distribution pipelines with multi-party code signing and automated integrity verification to protect their customer base from attacks like this one.

Leave a Reply

💬 [[ unisciti alla discussione! ]]


Se vuoi commentare su Smart Slider 3 Pro Plugin Backdoored via Supply Chain Attack — 800,000+ Sites at Risk, utilizza la discussione sul Forum.
Condividi esempi, IOCs o tecniche di detection efficaci nel nostro 👉 forum community