Vulnerabilities & CVEs

Smart Slider Hijack Pushes Malware to WP Sites

Imagine trusting an update to safeguard your site—only for it to unleash a horde of backdoors. That's the nightmare hackers delivered via Smart Slider 3 Pro, hitting nearly a million WordPress installs.

Hacked Smart Slider plugin update injecting backdoors into WordPress dashboard

Key Takeaways

  • Hijacked Smart Slider 3.5.1.35 pushes multi-layered backdoors, hidden admins, and credential theft to 900K+ sites.
  • Persistence via mu-plugins, themes, wp-includes survives DB resets—assume full compromise and nuke-rebuild.
  • Update to 3.5.1.36 immediately; restore April 5 backups; harden with 2FA, strong unique passwords.

Ever wondered why that routine plugin update feels like handing your site’s keys to a stranger in a dark alley?

Smart Slider 3 Pro—the slick WordPress and Joomla tool powering responsive sliders on over 900,000 websites—just got hijacked in the sneakiest supply-chain attack yet. Hackers poisoned version 3.5.1.35, slipping it out on April 7 to anyone auto-updating. Boom. Backdoors everywhere, hidden admins, stolen creds. It’s not just a glitch; it’s a masterclass in persistence, like a digital weed that roots itself in every corner of your CMS garden.

The devs at Smart Slider scrambled fast, urging everyone to roll back to 3.5.1.34 or jump to 3.5.1.36. But here’s the kicker—and my bold prediction: this isn’t a one-off. Plugin ecosystems are the Wild West of updates, begging for app-store-level code signing. Remember SolarWinds? This is that nightmare shrunk to WordPress scale, a harbinger that unverified updates could topple the whole CMS empire if ignored.

How Did the Smart Slider Hijack Unfold?

Picture this: you’re sipping coffee, your site pings for an update. Trusting the source—because why not?—you hit install. Except the update server got pwned. Malicious payload lands, masquerading as legit code while Smart Slider’s drag-and-drop editor keeps humming along, oblivious.

PatchStack’s sleuths tore it apart. The malware? A “fully featured, multi-layered toolkit” jammed into the plugin’s core file. Remote command execution via dodgy HTTP headers—no auth needed. Then a second backdoor for PHP eval and OS commands, but only if you’re logged in. Sneaky.

“Unlike the other persistence layers, this backdoor does not depend on the WordPress database, but reads its authentication key from a .cache_key file stored in the same directory,” PatchStack researchers explain.

That’s genius-level evil. Even if WordPress chokes on bootstrap, this beast survives—pulling creds from a faux-cache file in wp-includes, mimicking a core class.

It gets worse. Hidden admin user (watch for wpsvc_ prefix in Joomla). Mu-plugins directory spawned—those can’t-be-disabled ghosts that load first, invisible in the dashboard. Backdoor in your theme’s functions.php. Database creds harvested. Site info siphoned. Full compromise, assumed.

But.

This malware’s like that unkillable cockroach in your kitchen—multi-layered, self-repairing. Change DB passwords? Laughable; the wp-includes lurker doesn’t care. Nuke the plugin? Theme and mu-plugins linger. It’s persistence porn for attackers.

Why Is This Smart Slider Attack So Damn Clever?

Energy here: hackers didn’t smash the window—they picked the lock with your own key. Smart Slider’s live editor, those gorgeous layouts? Untouched. Your sliders spin pretty while the backdoors party.

Joomla users, same hell: /cache and /media dirs infested, hidden admins, data theft. Vendor’s warning? Crystal: restore from April 5 backups to dodge timezone tricks.

And the unique twist I see? Corporate PR spin calls it a “security breach in the update system.” Cute. But this reeks of targeted supply-chain sabotage, echoing NotPetya’s tax software ploy. Bold call: expect black markets hawking hijacked plugin streams soon—WordPress as the new battleground for nation-states testing cyber muscles.

PatchStack proved it: automated pentests lit up the exploit paths like a Christmas tree. Your controls? Useless without breach-and-simulate rigor.

What Happens If You Ignore the Smart Slider Malware?

Short answer: everything burns.

Stolen creds mean hosting pivots, email blasts, ransomware drops. That hidden admin? Ransom note central. Persistence layers ensure cleanups fail without total wipes.

Vendors push maintenance mode first—backup (pre-April 5 ideal), nuke rogue users/files/DB junk, reinstall core/plugins/themes from scratch. Rotate every password: WP, DB, FTP, hosting, email. Regen salts. Scan logs. Harden with 2FA, IP whitelists, unique strong passphrases.

No backup? Delete the plugin, grab clean 3.5.1.36. But assume compromise. Full nuke-rebuild.

Here’s the thing—WordPress’s 40% web share makes this cataclysmic. 900K sites? That’s e-commerce empires, blogs, portfolios. One lazy admin, and the chain reaction ripples.

Thrilling terror, right? Like watching a meteor hurtle toward plugin paradise, yet fixable if you act.

How to Bulletproof Your Site Post-Smart Slider

Start unconventional: don’t just patch—paranoid overhaul.

Manual cleanup? Devs scripted it: maintenance mode, rogue hunt, fresh installs. But layer on security headers, WAF, auto-backups. Ditch auto-updates for verified ones only.

My futurist wonder: AI-driven anomaly detection could spot these update poisons in real-time, sniffing malformed payloads like bloodhounds. We’re inches from that shift—don’t sleep.


🧬 Related Insights

Frequently Asked Questions

What caused the Smart Slider 3 Pro hijack?

Hackers compromised the update server, pushing version 3.5.1.35 with backdoors on April 7. Only Pro affected; free version safe.

Is my WordPress site infected by Smart Slider malware?

Check for version 3.5.1.35, hidden admins (wpsvc_), mu-plugins, or wp-includes oddities. Over 900K users at risk if auto-updated.

How do I remove Smart Slider backdoors?

Backup pre-April 5, delete plugin/users/files, reinstall clean, rotate all creds, scan, harden with 2FA. Full guide from vendor.

Aisha Patel
Written by

Former ML engineer turned writer. Covers computer vision and robotics with a practitioner perspective.

Frequently asked questions

What caused the Smart Slider 3 Pro hijack?
Hackers compromised the update server, pushing version 3.5.1.35 with backdoors on April 7. Only Pro affected; free version safe.
Is my WordPress site infected by Smart Slider malware?
Check for version 3.5.1.35, hidden admins (wpsvc_), mu-plugins, or wp-includes oddities. Over 900K users at risk if auto-updated.
How do I remove Smart Slider backdoors?
Backup pre-April 5, delete plugin/users/files, reinstall clean, rotate all creds, scan, harden with 2FA. Full guide from vendor.

Worth sharing?

Get the best Cybersecurity stories of the week in your inbox — no noise, no spam.

Originally reported by Bleeping Computer

Stay in the loop

The week's most important stories from Threat Digest, delivered once a week.