{"id":45259,"date":"2026-04-10T01:15:47","date_gmt":"2026-04-09T17:15:47","guid":{"rendered":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/04\/10\/smart-slider-updates-hijacked-to-push-malicious-wordpress-joomla-versions\/"},"modified":"2026-04-10T01:15:47","modified_gmt":"2026-04-09T17:15:47","slug":"smart-slider-updates-hijacked-to-push-malicious-wordpress-joomla-versions","status":"publish","type":"post","link":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/04\/10\/smart-slider-updates-hijacked-to-push-malicious-wordpress-joomla-versions\/","title":{"rendered":"Smart Slider updates hijacked to push malicious WordPress, Joomla versions"},"content":{"rendered":"\n<p style=\"text-align:center\"><img loading=\"lazy\" decoding=\"async\" height=\"897\" src=\"https:\/\/www.bleepstatic.com\/content\/hl-images\/2023\/12\/07\/back-2.jpg\" width=\"1600\" alt=\"Smart Slider updates hijacked to push malicious WordPress, Joomla versions\"><\/p>\n<p>Hackers hijacked the update system for the Smart Slider 3 Pro plugin for WordPress and Joomla, and pushed a malicious version with multiple backdoors.<\/p>\n<p>The developer says that only the Pro version&nbsp;3.5.1.35 of the plugin is affected and recommends switching immediately to the latest version, currently 3.5.1.36, or&nbsp;3.5.1.34 and earlier.<\/p>\n<p>Apart from installing backdoors in multiple locations, the malicious update created a hidden user with administrator permissions and stole sensitive data.<\/p>\n<p>Smart Slider 3 for WordPress is used on over 900,000 websites for responsive slider creation via a live slider editor, featuring a large selection of layouts and designs.<\/p>\n<p>According to the vendor, the threat actor distributed the&nbsp;malicious update on April 7, and some websites may have installed it.<\/p>\n<p>An analysis&nbsp;from PatchStack, a company focusing on securing WordPress and&nbsp;open-source software, notes that the malware&nbsp;is a fully featured, multi-layered toolkit embedded in the plugin&rsquo;s main file while preserving Smart Slider&#8217;s normal functionality.<\/p>\n<p>The researchers noticed that the malicious kit allows a remote attacker to execute commands without authentication via crafted HTTP headers. It also includes&nbsp;a second authenticated backdoor with both PHP eval and OS command execution, and automated credential theft.<\/p>\n<p>The malware achieves persistence through multiple layers, one being the creation of a hidden admin account and&nbsp;storing credentials in the database.<\/p>\n<div style=\"text-align:center\">\n<figure style=\"display:inline-block\"><img loading=\"lazy\" decoding=\"async\" height=\"600\" src=\"https:\/\/www.bleepstatic.com\/images\/news\/u\/1220909\/2026\/April\/admin.jpg\" width=\"473\" alt=\"Smart Slider updates hijacked to push malicious WordPress, Joomla versions\"><figcaption><strong>Creating a hidden admin account<\/strong><br \/><em>Source: PatchStack<\/em><\/figcaption><\/figure>\n<\/div>\n<p>Additionally, it creates a &#8216;mu-plugins&#8217; directory and creates a must-use plugin with a file name that pretends to be a legitimate caching component.<\/p>\n<p>Must-use plugins are special in that they are loaded automatically, cannot be disabled from the WordPress dashboard, and are not visible in the plugins section.<\/p>\n<p>PatchStack notes that the malicious kit also plants a backdoor in the active theme&#8217;s <em>functions.php<\/em> file, which allows it to persist for as long as the theme is active.<\/p>\n<p>Another persistence layer is injecting in the <em>wp-includes<\/em> directory a&nbsp;a PHP file with a name that mimics a legitimate WordPress core class.<\/p>\n<p>&#8220;Unlike the other persistence layers, this backdoor does not depend on the WordPress database, but reads its authentication key from a&nbsp;<code>.cache_key<\/code>&nbsp;file stored in the same directory,&#8221; PatchStack <a href=\"http:\/\/patchstack.com\/articles\/critical-supply-chain-compromise-in-smart-slider-3-pro-full-malware-analysis\/\" target=\"_blank\" rel=\"nofollow noopener\">researchers explain<\/a>.<\/p>\n<p>As such, changing the database credentials does not neutralize the backdoor, which continues to work &#8220;even if WordPress fails to bootstrap fully.&#8221;<\/p>\n<p>The vendor issued a <a href=\"https:\/\/smartslider.helpscoutdocs.com\/article\/2143-joomla-security-advisory-smart-slider-3-pro-3-5-1-35-compromise\" target=\"_blank\" rel=\"nofollow noopener\">similar warning for Joomla installations<\/a>, saying&nbsp;that the malicious code present in version 3.5.1.35 of the plugin may create a hidden admin account (usually with the prefix <em>wpsvc_<\/em>), install additional backdoors in the \/cache&nbsp; and \/media directories, and steal site information and credentials.<\/p>\n<h3>Recommended actions<\/h3>\n<p>The malicious update was distributed to users on April 7, but the Smart Slider team suggests April 5&nbsp;as the safest date for backup restoration, to ensure time zone differences are accounted for in all cases.<\/p>\n<p>&ldquo;A security breach affected the update system responsible for distributing Smart Slider 3 Pro for WordPress,&rdquo; reads the <a href=\"http:\/\/smartslider.helpscoutdocs.com\/article\/2144-wordpress-security-advisory-smart-slider-3-pro-3-5-1-35-compromise\" target=\"_blank\" rel=\"nofollow noopener\">vendor&#8217;s disclosure<\/a>.<\/p>\n<p>If no backup is available, it is recommended to remove the compromised plugin and install a clean version (3.5.1.36).<\/p>\n<p>Administrators who find the compromised plugin version should assume full site compromise and take the following action:<\/p>\n<ul>\n<li>Delete malicious users, files, and database entries<\/li>\n<li>Reinstall WordPress core, plugins, and themes from trusted sources<\/li>\n<li>Rotate all credentials (WP, DB, FTP\/SSH, hosting, email)<\/li>\n<li>Regenerate WordPress security keys (salts)<\/li>\n<li>Scan for remaining malware and review logs<\/li>\n<\/ul>\n<p>The vendor also provides a multi-step&nbsp;manual cleanup guide for WordPress and Joomla, which starts with getting the site into maintenance mode and backing it up.<\/p>\n<p>Admins should then clean the site of unauthorized admin users, remove all malicious components, and install all core files, plugins, and themes. Resetting all passwords and scanning for additional malware is also recommended.<\/p>\n<p>The final recommendations include hardening the site by activating two-factor authentication (2FA) protection, updating components to the latest versions, restricting admin access, and using strong passwords that are unique.<\/p>\n<style> .ia_ad {     background-color: #f0f6ff;     width: 95%;     max-width: 800px;     margin: 15px auto;     border-radius: 8px;     border: 1px solid #d6ddee;     display: flex;     align-items: stretch;     padding: 0;     overflow: hidden; }  .ia_lef {     flex: 1;     max-width: 200px;     height: auto;     display: flex;     align-items: stretch; }  .ia_lef a {     display: flex;     width: 100%;     height: 100%; }   .ia_lef a img {     width: 100%;     height: 100%;          border-radius: 8px 0 0 8px;     margin: 0;     display: block; }  .ia_rig {     flex: 2;     padding: 10px;     display: flex;     flex-direction: column;     justify-content: center; }  .ia_rig h2 {     font-size: 17px !important;     font-weight: 700;     color: #333;     line-height: 1.4;     font-family: Georgia, \"Times New Roman\", Times, serif;     margin: 0 0 14px 0; }  .ia_rig p {     font-weight: bold;     font-size: 14px;     margin: 0 0 clamp(6px, 2vw, 14px) 0; }  .ia_button {     background-color: #FFF;     border: 1px solid #3b59aa;     color: black;     text-align: center;     text-decoration: none;     border-radius: 8px;     display: inline-block;     font-size: 16px;     font-weight: bold;     cursor: pointer;     padding: 10px 20px;     width: fit-content; }  .ia_button a {     text-decoration: none;     color: inherit;     display: block; }  @media (max-width: 600px) {     .ia_ad {         flex-direction: column;         align-items: center;     }      .ia_lef {         max-width: 100%;     }      .ia_lef a img {         border-radius: 8px 8px 0 0;     }       .ia_rig {         padding: 15px;         width: 100%;     }      .ia_button {         width: 100%; \tmargin: 0px auto;     } } <\/style>\n<div>\n<div>         <a href=\"https:\/\/hubs.li\/Q048zztN0\" target=\"_blank\" rel=\"noopener sponsored\">             <img decoding=\"async\" src=\"https:\/\/www.bleepstatic.com\/c\/p\/picus-whitepaper.jpg\" alt=\"Smart Slider updates hijacked to push malicious WordPress, Joomla versions\">         <\/a>     <\/div>\n<div>\n<h2><a href=\"https:\/\/hubs.li\/Q048zztN0\" target=\"_blank\" rel=\"noopener sponsored\">Automated Pentesting Covers Only 1 of 6 Surfaces.<\/a><\/h2>\n<p>Automated pentesting proves the path exists. BAS proves whether your controls stop it. Most teams run one without the other.<\/p>\n<p>This whitepaper maps six validation surfaces, shows where coverage ends, and provides practitioners with three diagnostic questions for any tool evaluation.<\/p>\n<p>           <button><a href=\"https:\/\/hubs.li\/Q048zztN0\" target=\"_blank\" rel=\"noopener sponsored\">Get Your Copy Now<\/a><\/button>     <\/div>\n<\/p><\/div>\n<div>\n<h3>Related Articles:<\/h3>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/backdoored-telnyx-pypi-package-pushes-malware-hidden-in-wav-audio\/\">Backdoored Telnyx PyPI package pushes malware hidden in WAV audio<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/hackers-exploit-critical-flaw-in-ninja-forms-wordpress-plugin\/\">Hackers exploit critical flaw in Ninja Forms WordPress plugin<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/hackers-compromise-axios-npm-package-to-drop-cross-platform-malware\/\">Hackers compromise Axios npm package to drop cross-platform malware<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/file-read-flaw-in-smart-slider-plugin-impacts-500k-wordpress-sites\/\">File read flaw in Smart Slider plugin impacts 500K WordPress sites<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/trivy-supply-chain-attack-spreads-to-docker-github-repos\/\">Trivy supply-chain attack spreads to Docker, GitHub repos<\/a><\/p>\n<\/p><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Hackers hijacked the update system for the Smart Slider [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[28],"tags":[],"class_list":["post-45259","post","type-post","status-publish","format-standard","hentry","category--bleepingcomputer"],"_links":{"self":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/45259","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/comments?post=45259"}],"version-history":[{"count":0,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/45259\/revisions"}],"wp:attachment":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/media?parent=45259"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/categories?post=45259"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/tags?post=45259"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}