WordPress plugin suite hacked to push malware to thousands of sites
好的,我现在需要帮用户总结一篇文章的内容,控制在100字以内。首先,我得仔细阅读文章,抓住关键点。 文章主要讲的是WordPress插件EssentialPlugin被恶意攻击。超过30个插件被植入后门代码,允许未经授权的访问。攻击者去年植入代码,最近通过更新传播,生成垃圾页面和重定向。影响范围很大,有十万级安装量。发现者是Austin Ginder,他收到提示后发现了问题。 进一步调查发现,后门从2025年8月开始存在,是在项目被收购后出现的。EssentialPlugin成立于2015年,提供各种工具和主题。后门近期被激活,下载恶意文件注入到wp-config.php中,使用Ethereum地址进行 evasion。 WordPress.org迅速反应,关闭插件并推送更新中和后门。但警告核心配置文件未清理。建议管理员检查隐藏文件。 总结时要包括:恶意代码植入、影响范围、发现者、收购后的漏洞、WordPress的应对措施。控制在100字内。 </think> 超过30个WordPress插件被恶意代码入侵,允许未经授权访问网站。攻击者去年植入后门代码,并通过更新传播垃圾页面和重定向。该漏洞影响大量用户安装的插件,并于近期被发现。 2026-4-15 20:46:30 Author: www.bleepingcomputer.com(查看原文) 阅读量:1 收藏

WordPress plugin suite hacked to push malware to thousands of sites

More than 30 WordPress plugins in the EssentialPlugin package have been compromised with malicious code that allows unauthorized access to websites running them.

A malicious actor planted the backdoor code last year but only recently started pushing it to users via updates, generating spam pages and causing redirects, as per the instructions received from the command-and-control (C2) server.

The compromise affects plugins with hundreds of thousands of active installations and was spotted by Austin Ginder, the founder of managed WordPress hosting provider Anchor Hosting, after receiving a tip about one add-on containing code that allowed third-party access.

Wiz

Further investigation by Ginder revealed that a backdoor had been present in all plugins within the EssentialPlugin package since August 2025, after the project was acquired in a six-figure deal by a new owner.

EssentialPlugin, established in 2015 as WP Online Support and rebranded in 2021, is a WordPress development firm offering sliders, galleries, marketing tools, WooCommerce extensions, SEO/analytics utilities, and themes.

According to Ginder, the backdoor sat inactive until it was recently activated and silently contacted external infrastructure to fetch a file (‘wp-comments-posts.php’) that injects malware into ‘wp-config.php.’

The downloaded malware is invisible to site owners and uses Ethereum-based C2 address resolution for evasion. Depending on the received instructions, the malware can retrieve "spam links, redirects, and fake pages".

“The injected code was sophisticated. It fetched spam links, redirects, and fake pages from a command-and-control server. It only showed the spam to Googlebot, making it invisible to site owners,” explained Ginder.

Analysis from WordPress security platform PatchStack shows that the backdoor worked only if the 'analytics.essentialplugin.com' endpoint returned with a malicious serialized content.

WordPress action and infection status

WordPress.org responded quickly to the reports of the malicious activity by closing the plugins and pushing a forced update to websites to neutralize the backdoor’s communication and disable its execution path.

However, the developers warned that the action did not clean the wp-config core configuration file, which connects websites to their databases and includes important settings.

The WordPress.org Plugins Team also cautioned administrators with websites running an EssentialPlugin product that while one known location for the backdoor is a file named wp-comments-posts.php, which resembles the legitimate wp-comments-post.php, the malware may also hide in other files.

BleepingComputer has contacted EssentialPlugins for a comment on the reported malicious commit that occurred after the acquisition, but we have not received a response by publishing time.

tines

Automated Pentesting Covers Only 1 of 6 Surfaces.

Automated pentesting proves the path exists. BAS proves whether your controls stop it. Most teams run one without the other.

This whitepaper maps six validation surfaces, shows where coverage ends, and provides practitioners with three diagnostic questions for any tool evaluation.


文章来源: https://www.bleepingcomputer.com/news/security/wordpress-plugin-suite-hacked-to-push-malware-to-thousands-of-sites/
如有侵权请联系:admin#unsafe.sh