Medium Vulnerability

Smart Slider 3 Pro Backdoored via Hijacked Update

Hackers hijacked the update system for the Smart Slider 3 Pro plugin for WordPress and Joomla, and pushed a malicious version with multiple backdoors. [...]

What Happened

A supply-chain attack has compromised the update mechanism for the Smart Slider 3 Pro plugin, a popular tool for WordPress and Joomla. Threat actors gained control of the plugin developer Nextend’s update infrastructure, allowing them to distribute a malicious version (3.5.1.9) to users who attempted to update automatically. This poisoned update contained multiple backdoors, granting attackers persistent, unauthorized access to affected websites. The incident was not a vulnerability in the plugin’s code, but a hijacking of its official distribution channel.

Why It Matters

This attack bypasses traditional vulnerability scanning and patching workflows. Security teams that diligently update plugins to protect against known flaws like CVE-2026-34424: Smart Slider 3 Pro RCE - Patch Now were instead delivered a weaponized update directly from the “trusted” source. It undermines the foundational trust in software supply chains for the WordPress and Joomla ecosystems, impacting any organization using the premium plugin. The backdoors provide a foothold for data theft, credential harvesting, or further network compromise.

Technical Details

The attackers compromised the update server at secure.nextendweb.com. When a site administrator triggered an update check, the server delivered the trojaned nextend-smart-slider3-pro.zip package. Analysis of the malicious code reveals at least two distinct backdoors. One is a simple webshell hidden within plugin files, allowing arbitrary code execution via web requests. The other is a more obfuscated, persistent backdoor that can survive plugin updates or re-installation, demonstrating an intent for long-term access. The attack vector required no user interaction beyond clicking “update.”

Immediate Risk

All WordPress and Joomla sites running Smart Slider 3 Pro that performed an update around the time of the server compromise are at critical risk. The backdoors grant remote attackers full control. The urgency is high for investigation and remediation. Organizations must immediately:

  1. Verify the installed version of Smart Slider 3 Pro. Version 3.5.1.9 is confirmed malicious.
  2. Assume compromise if this version is present. A full security audit of the affected site is required.
  3. Revert to a known-clean backup from before the update or manually install a verified clean version (3.5.1.10 or later) after completely removing the malicious files.

Security Insight

This incident mirrors the historical SolarWinds attack in microcosm, demonstrating that the most critical link in the software chain is often the update server itself. While WordPress ecosystem threats are frequently focused on plugin vulnerabilities (see related flaws in Vertex Addons or WCFM), this attack shifts the battleground to vendor infrastructure security. A key defensive takeaway is to implement a brief delay for non-critical plugin updates in staging environments, allowing time for the security community to detect and report such supply-chain poisonings before they hit production systems.

Further Reading

Share:

Never miss a security update

Get real-time security alerts delivered to your preferred platform.

Related News

Never Miss a Critical Alert

CVE advisories, breach reports, and threat intel — delivered daily to your inbox.