Smart Slider 3 Pro Backdoored via Hijacked Update
Hackers hijacked the update system for the Smart Slider 3 Pro plugin for WordPress and Joomla, and pushed a malicious version with multiple backdoors. [...]
What Happened
A supply-chain attack has compromised the update mechanism for the Smart Slider 3 Pro plugin, a popular tool for WordPress and Joomla. Threat actors gained control of the plugin developer Nextend’s update infrastructure, allowing them to distribute a malicious version (3.5.1.9) to users who attempted to update automatically. This poisoned update contained multiple backdoors, granting attackers persistent, unauthorized access to affected websites. The incident was not a vulnerability in the plugin’s code, but a hijacking of its official distribution channel.
Why It Matters
This attack bypasses traditional vulnerability scanning and patching workflows. Security teams that diligently update plugins to protect against known flaws like CVE-2026-34424: Smart Slider 3 Pro RCE - Patch Now were instead delivered a weaponized update directly from the “trusted” source. It undermines the foundational trust in software supply chains for the WordPress and Joomla ecosystems, impacting any organization using the premium plugin. The backdoors provide a foothold for data theft, credential harvesting, or further network compromise.
Technical Details
The attackers compromised the update server at secure.nextendweb.com. When a site administrator triggered an update check, the server delivered the trojaned nextend-smart-slider3-pro.zip package. Analysis of the malicious code reveals at least two distinct backdoors. One is a simple webshell hidden within plugin files, allowing arbitrary code execution via web requests. The other is a more obfuscated, persistent backdoor that can survive plugin updates or re-installation, demonstrating an intent for long-term access. The attack vector required no user interaction beyond clicking “update.”
Immediate Risk
All WordPress and Joomla sites running Smart Slider 3 Pro that performed an update around the time of the server compromise are at critical risk. The backdoors grant remote attackers full control. The urgency is high for investigation and remediation. Organizations must immediately:
- Verify the installed version of Smart Slider 3 Pro. Version 3.5.1.9 is confirmed malicious.
- Assume compromise if this version is present. A full security audit of the affected site is required.
- Revert to a known-clean backup from before the update or manually install a verified clean version (3.5.1.10 or later) after completely removing the malicious files.
Security Insight
This incident mirrors the historical SolarWinds attack in microcosm, demonstrating that the most critical link in the software chain is often the update server itself. While WordPress ecosystem threats are frequently focused on plugin vulnerabilities (see related flaws in Vertex Addons or WCFM), this attack shifts the battleground to vendor infrastructure security. A key defensive takeaway is to implement a brief delay for non-critical plugin updates in staging environments, allowing time for the security community to detect and report such supply-chain poisonings before they hit production systems.
Further Reading
Never miss a security update
Get real-time security alerts delivered to your preferred platform.
Related News
Cybersecurity roundup for 2026-04-06 to 2026-04-12. 10 CVE advisories, 2 breach reports, 4 threat news stories.
CISA warned that attackers are now exploiting a high-severity Apache ActiveMQ vulnerability, which was patched earlier this month after going undetected for 13 years. [...]
Adobe has released an emergency security update for Acrobat Reader to fix a vulnerability, tracked as CVE-2026-34621, that has been exploited in zero-day attacks since at least December. [...]
A new attack, dubbed GPUBreach, can induce Rowhammer bit-flips on GPU GDDR6 memories to escalate privileges and lead to a full system compromise. [...]