Smart Slider Hijacked: 900K WordPress Sites Get Backdoored
Attackers compromised Nextend's update infrastructure to push a malicious Smart Slider 3 Pro version with four layers of backdoors. Here's who's affected and how to recover.
An attacker hijacked the update mechanism for Smart Slider 3 Pro on April 7, pushing a backdoored version to hundreds of thousands of WordPress and Joomla websites. Anyone who clicked "update" received working remote code execution as the web server user.
The malicious version 3.5.1.35 contained a multi-layered persistence toolkit that maintained access even after partial cleanup. Nextend, the plugin's developer, has since released a clean 3.5.1.36 build and is urging immediate action.
What Happened
Unauthorized parties gained access to Nextend's update infrastructure and pushed a compromised build through the official channel. The attack is particularly insidious because the malicious plugin preserved all normal functionality while embedding hidden backdoors.
According to PatchStack's analysis, the malware implemented what they described as a "fully featured, multi-layered toolkit" designed to survive typical cleanup attempts. The WPScan vulnerability database has catalogued this compromise as a critical threat. This supply chain approach mirrors recent npm package attacks where attackers target trusted distribution channels to maximize reach.
Four Layers of Persistence
The backdoor established multiple persistence mechanisms, making complete remediation difficult:
-
Hidden administrator accounts - The malware creates admin users with names starting with
wpsvc_and the email address[email protected]. These accounts are stored in the database and survive plugin removal. -
Must-use plugins - Malicious code is placed in the
/mu-pluginsdirectory, which WordPress automatically loads on every request. These files can't be disabled through the admin panel. -
Theme injection - The attacker's code is appended to the active theme's
functions.phpfile, ensuring execution even if the plugin is deleted. -
Core file spoofing - Fake class files are placed in
/wp-includesthat use cached authentication keys for persistent access.
What the Backdoor Does
The compromised code enabled attackers to:
- Execute arbitrary shell commands and PHP code remotely
- Create additional hidden administrator accounts
- Exfiltrate credentials and database contents
- Maintain persistent access across plugin updates
The remote execution component required no authentication—attackers could trigger it using crafted HTTP headers against any infected site.
Scope of Impact
Smart Slider 3 is installed on over 900,000 WordPress websites according to the WordPress plugin directory. The Pro version, which was specifically targeted in this attack, represents a significant portion of that user base.
Joomla installations running Smart Slider 3 Pro were also affected, following the same compromise pattern. The attack demonstrates how supply chain compromises can affect multiple platforms simultaneously when plugins support cross-CMS deployment. WordPress has been a frequent target this year—we recently covered an ImageMagick vulnerability that also threatened WordPress installations.
This incident follows a pattern of malicious packages targeting developers and end users through trusted update channels—a growing trend in 2026.
How to Check If You're Affected
Sites running version 3.5.1.35 should assume compromise. Indicators include:
- Admin accounts with usernames starting with
wpsvc_ - Email addresses containing
[email protected]in the users table - Unfamiliar files in
/wp-content/mu-plugins/ - Recent modifications to your theme's
functions.php - Unexpected files in
/wp-includes/
Recommended Recovery Steps
Nextend recommends a complete recovery process for affected sites:
-
Restore from backup - Use a backup dated April 5, 2026 or earlier to ensure no malicious code remains. Due to timezone differences in when the attack began, Nextend recommends this conservative date.
-
If restoration isn't possible, perform a full cleanup:
- Reinstall WordPress core, all plugins, and themes from trusted sources
- Remove any unknown admin users from the database
- Delete suspicious files from
/mu-plugins/and/wp-includes/ - Review and clean theme
functions.phpfiles
-
Rotate all credentials - This includes WordPress admin passwords, database credentials, FTP/SSH access, hosting control panel, and any associated email accounts.
-
Enable two-factor authentication on all admin accounts.
-
Regenerate WordPress security keys in
wp-config.php. -
Update to version 3.5.1.36 only after completing the cleanup process.
Why This Matters
Supply chain attacks against WordPress plugins continue to grow in sophistication. Unlike vulnerabilities that require specific conditions to exploit, compromised updates affect every user who trusts the official update mechanism.
The multi-layered persistence in this attack shows that threat actors are learning from previous incidents. A site owner who simply removes the plugin and reinstalls would remain compromised through the theme injection and mu-plugin layers.
For security teams managing WordPress at scale, this incident reinforces the need for update monitoring, file integrity checking, and backup strategies that support rapid rollback.
Nextend has stated they're auditing their infrastructure to prevent similar compromises. They've pulled 3.5.1.35 from distribution and published detailed advisories for both WordPress and Joomla users.
Related Articles
DAEMON Tools Trojanized Since April—Backdoor Hit 100+ Countries
Kaspersky uncovered a supply chain attack on DAEMON Tools official website. Trojanized installers deployed QUIC RAT backdoors to thousands of systems, with a dozen government and manufacturing targets receiving advanced payloads.
May 8, 2026WooCommerce Stores Under Attack via Funnel Builder Flaw
Attackers exploit unauthenticated vulnerability in Funnel Builder plugin to inject payment skimmers on 40,000+ WordPress stores. Patch to 3.15.0.3 immediately.
May 17, 2026node-ipc Hijacked via Expired Domain, Steals 90+ Credential Types
Attackers seized control of node-ipc by re-registering the maintainer's expired email domain. Three malicious versions now harvest AWS, GCP, Azure keys and more.
May 15, 2026JDownloader Website Hacked—Malicious Installers Served for 24 Hours
Attackers exploited a CMS flaw on JDownloader's website to swap download links with trojanized installers. Windows users got a Python RAT; Linux users got root-persisted ELF binaries.
May 10, 2026