WordPress Plugin Backdoor Attack Hits Thousands of Sites
A sophisticated supply chain attack has compromised dozens of WordPress plugins, potentially exposing thousands of websites to malicious code. The incident, first reported by security researcher Austin Ginder, involves backdoors planted by a new corporate owner of the plugin developer Essential Plugin. This WordPress plugin backdoor attack highlights the growing risk of plugin ownership changes going unnoticed by site administrators.
According to Ginder, the backdoor was inserted into the source code of multiple plugins after an anonymous buyer acquired Essential Plugin last year. The malicious code remained dormant for months before activating earlier this month, distributing harmful payloads to any site running the affected plugins. WordPress’s plugin directory shows that over 20,000 active installations are impacted, while Essential Plugin claims more than 400,000 installs and 15,000 customers.
How the WordPress Plugin Backdoor Attack Works
Plugins are essential for extending WordPress functionality, but they also grant deep access to a website’s core files. In this case, the attackers exploited that trust. The backdoor allowed them to inject arbitrary code into websites, potentially stealing data, redirecting traffic, or installing further malware.
What makes this attack particularly dangerous is the lack of transparency. WordPress does not notify users when a plugin changes ownership. As a result, site owners may unknowingly run software controlled by malicious actors. Ginder warns that this is the second plugin hijacking discovered in as many weeks, suggesting a broader trend.
Affected Plugins and Immediate Steps
The compromised plugins have been removed from the WordPress directory, with their status listed as “permanent” closure. However, if you have any of these plugins installed, they may still be active on your site. Ginder has published a full list of affected plugins on his blog.
To protect your website, follow these steps immediately:
- Check your installed plugins against the affected list.
- Delete any compromised plugins completely—not just deactivate them.
- Scan your site for malware using a reputable security plugin like Wordfence.
- Change all admin passwords and review user accounts for suspicious activity.
Security researchers have long warned about the risks of supply chain attacks in open-source ecosystems. When a plugin changes hands, the new owner can alter its code without users’ knowledge, turning a trusted tool into a vector for attack.
Why Plugin Ownership Changes Are a Security Blind Spot
WordPress powers over 40% of all websites, making it a prime target for attackers. Plugin developers often sell their products to third parties, but the platform provides no automated alert system for ownership transfers. This leaves site owners vulnerable to what security experts call “plugin hijacking.”
In this case, the backdoor was added shortly after the sale and remained hidden for months. The delayed activation suggests a planned, patient attack designed to maximize impact. Ginder believes that similar attacks may already be underway on other plugins.
What the Industry Can Learn
This incident underscores the need for better security practices in the WordPress ecosystem. Plugin directories should implement ownership change notifications, and site owners should regularly audit their plugins for unusual behavior. Additionally, using a comprehensive WordPress security checklist can help mitigate risks.
Representatives for Essential Plugin have not responded to requests for comment. Meanwhile, the WordPress community is urging users to remain vigilant and report any suspicious plugin activity.
Final Thoughts on the WordPress Plugin Backdoor Attack
This WordPress plugin backdoor attack serves as a stark reminder that trust in third-party code must be earned and verified. As supply chain attacks become more common, site owners must take proactive steps to secure their installations. Removing compromised plugins, monitoring for anomalies, and staying informed about security advisories are essential practices.
Have you checked your WordPress plugins today? If not, now is the time to act before your site becomes the next victim.