Hacker News Viewer

Someone bought 30 WordPress plugins and planted a backdoor in all of them

by speckx on 4/13/2026, 5:54:39 PM

https://anchor.host/someone-bought-30-wordpress-plugins-and-planted-a-backdoor-in-all-of-them/

Comments

by: chromacity

This is a perfect illustration of what cracks me up about the hyperbolic reactions to Mythos. Yes, increased automation of cutting-edge vulnerability discovery will shake things up a bit. No, it&#x27;s nowhere near the top of what should be keeping you awake at night if you&#x27;re working in infosec.<p>We&#x27;ve built our existing tech stacks and corporate governance structures for a different era. If you want to credit one specific development for making things dramatically worse, it&#x27;s cryptocurrencies, not AI. They&#x27;ve turned the cottage industry of malicious hacking into a multi-billion-dollar enterprise that&#x27;s attractive even to rogue nations such as North Korea. And with this much at stake, they can afford to simply buy your software dependencies, or to offer one of your employees some retirement money in exchange for making a &quot;mistake&quot;.<p>We know how to write software with very few bugs (although we often choose not to). We have no good plan for keeping big enterprises secure in this reality. Autonomous LLM agents will be used by ransomware gangs and similar operations, but they don&#x27;t need FreeBSD exploit-writing capabilities for that.

4/13/2026, 6:44:24 PM


by: bradley13

Whenever I look at a web project, it starts with &quot;npm install&quot; and literally dozens of libraries get downloaded.<p>The project authors probably don&#x27;t even know what libraries their project requires, because many of them are transitive dependencies. There is zero chance that they have checked those libraries for supply chain attacks.

4/13/2026, 6:23:47 PM


by: toniantunovi

The supply chain attack surface in WordPress plugins has always been particularly dangerous because the ecosystem encourages users to install many small single-purpose plugins from individual developers, most of whom aren&#x27;t security-focused organizations. Buying out an established plugin with a large install base is a clever approach because you inherit years of user trust that took the original developer a long time to build.<p>The deeper structural issue is that plugin update notifications function as an implicit trust signal. Users see &quot;update available&quot; and click without questioning whether the author is still the same person. A package signing and transfer transparency system similar to what npm has been working toward would help here, but the WordPress ecosystem has historically moved slowly on security infrastructure.

4/13/2026, 7:04:14 PM


by: spankalee

I really wish that the FAIR package manager project had been successful, but they recently gave up after the WordPress drama died down.<p><a href="https:&#x2F;&#x2F;fair.pm&#x2F;" rel="nofollow">https:&#x2F;&#x2F;fair.pm&#x2F;</a><p>FAIR has a very interesting architecture, inspired by atproto, that I think has the potential to mitigate some of the supply-chain attacks we&#x27;ve seen recently.<p>In FAIR, there&#x27;s no central package repository. Anyone can run one, like an atproto PDS. Packages have DIDs, routable across all repositories. There are aggregators that provide search, front-ends, etc. And like Bluesky, there are &quot;labelers&quot;, separate from repositories and front-ends. So organizations like Socket, etc can label packages with their analysis in a first class way, visible to the whole ecosystem.<p>So you could set up your installer to ban packages flagged by Socket, or ones that recently published by a new DID, etc. You could run your own labeler with AI security analysis on the packages you care about. A specific community could build their own lint rules and label based on that (like e18e in the npm ecosystem.<p>Not perfect, but far better than centralized package managers that only get the features their owner decides to pay for.

4/13/2026, 6:41:00 PM


by: jimrandomh

I think the main problem here is the ideology of software updating. Updates represent a tradeoff: On one hand there might be security vulnerabilities that need an update to fix, and developers don&#x27;t want to receive bug reports or maintain server infrastructure for obsolete versions. On the other hand, the developer might make decisions users don&#x27;t want, or turn evil temporarily (as in a supply chain attack) or permanently (as in selling off control of a Wordpress extension).<p>In the case of small Wordpress extensions from individual developers, I think the tradeoff is such that you should basically never allow auto-updating. Unfortunately wordpress.org runs a Wordpress extension marketplace that doesn&#x27;t work that way, and worse. I think that other than a small number of high-visibility long-established extensions, you should basically never install anything from there, and if you want a Wordpress extension you should download its source code and install it manually as an unpacked extension.<p>(This is a comment that I wrote about Chrome extensions, where I replaced Chrome with Wordpress, deleted one sentence about Google, and it was all still true. <a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=47721946#47724474">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=47721946#47724474</a> )

4/13/2026, 10:00:40 PM


by: lambdaone

It seems obvious to me that there should now be a concerted and open effort to detect malware in supply chains based on AI-based scanning. Sure, there will be an arms race in malware obfuscation, but that was coming anyway. Manual review is useless at this scale - it is just not happening.

4/14/2026, 11:45:13 AM


by: amai

Wordpress has always been a backdoor with and without plugins.

4/14/2026, 12:23:13 PM


by: RandomGerm4n

This is probably a controversial opinion but this case is yet another example of why it should be prohibited to sell repositories and storefronts. If you want to take over someone else’s user base you should be forced to display a message to the users and actively ask them whether they trust the new owner as well. Simply passing the whole thing on to someone else in secret who could then compromise the WordPress plugin, a browser extension or something similar should not be allowed.

4/14/2026, 9:26:00 AM


by: edg5000

&gt; In 2017, a buyer using the alias “Daley Tias” purchased the Display Widgets plugin (200,000 installs) for $15,000 and injected payday loan spam.<p>Is that it? Going through all that trouble just for some spam? Surely more lucrative criminal actions can be imagined with a compromised WP plugin?

4/14/2026, 3:55:03 AM


by: fblp

Hear me out. Mergers and acquisitions that substantially lesson market competition can be blocked by governments, or even require approval in certain jurisdictions. <a href="https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;Mergers_and_acquisitions" rel="nofollow">https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;Mergers_and_acquisitions</a><p>Maybe mergers or acquisitions that substantially impact security should require approval by marketplaces (industry governance), and notification and approval by even governments?

4/13/2026, 8:51:40 PM


by: alex1sa

What’s scary is that this attack doesn’t require any technical sophistication. You don’t need zero-days, you don’t need exploits — you just need money. Feels like we’ve shifted from “can you break in?” to “can you buy your way in?”, which is a very different problem.

4/14/2026, 7:02:46 AM


by: edg5000

If the plugins were bought for six figures, then it must be incredibly lucrative. How on earth could they be making it back? Is injecting spam into Google results THAT lucrative?

4/14/2026, 3:57:02 AM


by: elric

A tale as old as time. And hard to defend against. Did the sellers know their plugins were going to be abused? Is there some kind of seller liability in cases like this?

4/14/2026, 8:23:46 AM


by: ChuckMcM

I don&#x27;t think companies appreciated just how much they gave up when they outsourced &quot;IT&quot;.

4/13/2026, 6:56:30 PM


by: meteyor

So how was this attack gonna generate &quot;revenue&quot; for the attacker? What kind of info did they get hold of?

4/13/2026, 6:24:19 PM


by: K0IN

At this point im not sure how we can reestablish trust in the software supply chain, especailly for small businesses.

4/13/2026, 9:17:35 PM


by: aitchnyu

Deno can whitelist outbound connections to certain hosts or refuse them altogether. If the average backend service is locked down this way, will the supply chain economy survive?

4/14/2026, 8:02:24 AM


by: latentframe

This looks to be more than just a security bug and rather an incentive problem because you can buy trust with plugin installs numbers and reputation but there’s no mechanism to reprice that trust after the ownership gets changed so the attackers just buy the distribution and monetize it later and that makes this kind of attack economically rational, so it gets reproduced often

4/14/2026, 3:30:12 AM


by: ashishb

WordPress was great because of the plugins.<p>WordPress is now a dangerous ecosystem because of the plugins and their current security model.<p>I moved to Hugo and encourage others to do so - <a href="https:&#x2F;&#x2F;ashishb.net&#x2F;tech&#x2F;wordpress-to-hugo&#x2F;" rel="nofollow">https:&#x2F;&#x2F;ashishb.net&#x2F;tech&#x2F;wordpress-to-hugo&#x2F;</a>

4/13/2026, 8:12:02 PM


by: vedant_awasthi

Interesting perspective. Feels like AI-assisted development is powerful, but without structure it can quickly become messy.

4/14/2026, 10:13:33 AM


by: pants2

One interesting note is the plugins were acquired on Flippa, which is a general marketplace to buy&#x2F;sell software businesses, not limited to WP plugins.<p>What I worry about are the long tail of indie apps&#x2F;extensions&#x2F;plugins that can get acquired under good intentions and then weaponized. These apps are probably worth more to a threat actor than someone who wants to operate the business genuinely.

4/14/2026, 12:20:40 AM


by: jdthedisciple

Presumably, Wordpress knows more about the identity of the buyer and will initiate legal action against them... right?

4/14/2026, 6:43:57 AM


by: antaviana

Crypto has single handedly created a very large malware industry and has also made information security a massive industry.<p>Ban crypto and both industries will become way, way smaller.

4/13/2026, 9:21:38 PM


by: ValentineC

This somehow reminds me of the irony that was Secure Custom Fields:<p><a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=41821336">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=41821336</a>

4/13/2026, 6:37:42 PM


by: arjie

Personally, I&#x27;ve found that nowadays the README.md file of most projects is more useful than the code. With the code I inherit their dependency chain and all of that. But with an LLM I can rewrite most of these things myself. This is not yet to the degree of universality. For instance I still use ratatui, but I also don&#x27;t use a worktree manager or a Claude coordinator from other people - I just have my own. I also don&#x27;t use OpenClaw - I have my own.<p>Looking at the list of plugins, I&#x27;d probably write accordion-and-accordion-slider and so on myself (meaning Claude Code and Codex would do most of the work). I think the future of software is like that: there is no reason to use most dependencies and so we&#x27;ll likely tend towards our own library of software, with the web of trust unnecessary because all we need are other people&#x27;s ideas, not their software.

4/14/2026, 1:56:08 AM


by: zadikian

It&#x27;s been a while, but what struck me about Wordpress plugins is how many have almost no value add over the &quot;manual&quot; way, even ignoring the security aspect. Like wrappers around Stripe.

4/14/2026, 2:01:02 AM


by: linzhangrun

Is it my imagination, or have supply chain attacks like this been becoming increasingly frequent since the xz incident?

4/14/2026, 1:37:49 AM


by:

4/13/2026, 6:15:06 PM


by: sourcecodeplz

Ah WordPress, the ever growing security nightmare

4/14/2026, 4:55:10 AM


by: Projectiboga

So how should everyday users attempt to avoid this risk? And how to stay vigilant?

4/13/2026, 9:16:42 PM


by: ramon156

Same day that I submit my own plug-in :( hopefully doesn&#x27;t interfere with anything.

4/13/2026, 7:42:41 PM


by: donohoe

Do browser extensions next…

4/14/2026, 2:21:45 AM


by: gonesilent

Rinse repeat. Same thing happens with plugins.

4/13/2026, 8:20:44 PM


by: neilv

Legal questions...<p>In browser plugins and mobile apps (and maybe WordPress plugins?), it&#x27;s pretty well known that malware attackers buying those is a frequent thing, and a serious threat. So:<p>1. So is there an argument to be made that a developer&#x2F;publisher&#x2F;marketplace selling such software, after it has established a reputation and an installed base, may have an obligation to make some level of effort not to sell out their users to malware&#x2F;criminals?<p>2. Do we already have some parties developing software with the intention of selling it to malware&#x2F;criminals, planning that selling it will insulate them from being considered a co-conspirator or accessory?

4/13/2026, 9:44:25 PM


by: empressplay

All my sites got pwned through this. Attempts to restore from backup just got pwned again in minutes. Ended up using Claude to create static sites from the database and the assets.<p>I&#x27;m never using Wordpress again and I strongly suggest nobody else does either.

4/14/2026, 12:42:26 AM


by: carabiner

The guy probably owns like 4,000 of these plugins and has factored in that 5% will get caught per year and makes bank from the rest of them.

4/13/2026, 9:50:11 PM


by: h4kunamata

I mean, WordPress kets getting compromised left and right.<p>It begs the question, who is at faulty here??<p>I would never run a piece of software that either itself gets compromised or the tons of plugins it sometimes depends on.

4/13/2026, 11:30:35 PM


by: antonvs

Couldn’t happen to a more technically deserving CMS.

4/13/2026, 9:40:05 PM


by: tap-snap-or-nap

Accepting unknown packages is just another form of vibe coding.

4/13/2026, 9:03:52 PM


by: aksss

I can foresee a modern code-signing regimen with paid gatekeepers coming to mitigate the risk of supply chain attacks. Imagine the purported strength of mythos automating scans of PRs or releases with some manner of indelible and traceable certification. There&#x27;s some industrious company - a modern verisign of old - that will attempt to drop in a layer of $250-500 per year fees for that service, capture the app stores to require it. Call me a cynical bastard, but &quot;I was there, Gandalf&quot;.

4/13/2026, 8:34:43 PM


by: 0xbadcafebee

This is interesting, because not only was this not a hack (someone bought the plugin and changed its operation), it&#x27;s something that would be solved by a separate solution I have to security vulnerabilities in general.<p>A software building code could provide a legal framework to hold someone liable for transferring ownership of a software product and significantly altering its operation without informing its users. This is a serious issue for any product that depends on another product to ensure safety, privacy, financial impact, etc. It could add additional protections like requiring that cryptographic signature keys be rotated for new owners, or a 30-day warning period where users are given a heads up about the change in ownership or significant operation of the product. Or it could require architectural &quot;bulkheads&quot; that prevent an outside piece of software from compromising the entire thing (requiring a redesign of flawed software). The point of all this would be to prevent a similar attack in the future that might otherwise be legal.<p>But why a software building code? Aren&#x27;t building codes slow and annoying and expensive? Isn&#x27;t it impossible to make a good regulation? Shouldn&#x27;t we be moving faster and cheaper? Why should I care?<p>You should care about a building code, because:<p>1. These major compromises are getting easier, not harder. Tech is big business, and it isn&#x27;t slowing down, it&#x27;s ramping up. AI makes attacks easier, and attackers see it&#x27;s working, so they are more emboldened. Plus, cyber warfare is now the cheaper, more effective way to disrupt operations overseas, without launching a drone or missile, and often without a trace.<p>2. All of the attacks lately have been preventable. They all rely on people not securing their stacks and workflows. There&#x27;s no new cutting-edge technology required; you just need to follow the security guidelines that security wonks have been going on and on about for a decade.<p>3. Nobody is going to secure their stack until you force them to. The physical realm we occupy will never magically make people spontaneously want to do more effort and take more time just to prevent a potential attack at some random point in the future. If it&#x27;s optional, and more effort, it will be avoided, every time. &quot;The Industry&quot; has had decades to create &quot;industry&quot; solutions to this, and not only haven&#x27;t they done this, the industry&#x27;s track record is getting worse.<p>4. The only thing that will stop these attacks is if you create a consequence for not preventing them. That&#x27;s what the building code does. Hold people accountable with a code in law. Then they will finally take the extra time and money necessary to secure their shit.<p>5. The building code does not have to be super hard, or perfect. It just has to be better than what we have now. That&#x27;s a very low bar. It will be improved over time, like the physical world&#x27;s building code, fire code, electrical code, health &amp; safety code, etc. It will prevent the easily preventable, standardize common practice, and hold people accountable for unnecessarily putting everyone at risk.<p>I keep saying it again and again. I get downvoted every time, but I don&#x27;t care. I&#x27;ll keep saying it and saying it, until eventually, years from now, somebody who needs to hear it, will hear it.

4/13/2026, 8:48:23 PM


by: shevy-java

Well - that kind of shows that WordPress is still popular. :)

4/13/2026, 6:56:02 PM


by: saltyoldman

I see a future where there are LLM vetted repos for Java, Python, Go, etc... And it will cost $1 to submit a release candidate (even for open source)<p>edit: The idea is the $1 goes towards the tokens required to scan the source code by an LLM, not simply cost a dollar for no other reason that raising the bar.<p>First submission is full code scan, incremental releases the scanner focuses on the diffs.

4/13/2026, 6:17:57 PM


by: nonozone

[dead]

4/14/2026, 11:18:53 AM


by: EGreg

I used to think that HN is full of enlightened open minded people who are open to correcting misconceptions if presented with new evidence, and adopting better practices.<p>But I have encountered a lot of groupthink, brigading downvotes etc. So I stopped having high expectations over the years.<p>In the case of Wordpress plugins, it’s bloody obvious that loading arbitrary PHP code in your site is insecure. And with npm plugins, same thing.<p>Over the years, I tried to suggest basic things… pin versions; require M of N signatures by auditors on any new versions. Those are table stakes.<p>How about moving to decentralized networks, removing SSH entirely, having a cryptocurrency that allows paying for resources? Making the substrate completely autonomous and secure by default? All downvoted. Just the words “decentralized” and “token” already make many people do TLDR and downvote. They hate tokens that much, regardless of their necessity to decentralized systems.<p>So I kind of gave up trying to win any approval, I just build quietly and release things. They have to solve all these problems. These problems are extremely solvable. And if we don’t solve them as an industry, there’s going to be chaos and it’s going to be very bad.

4/13/2026, 7:10:13 PM


by: mark124mj

[dead]

4/14/2026, 5:40:54 AM


by: vomayank

[dead]

4/14/2026, 1:33:26 AM


by: jerukmangga

[dead]

4/14/2026, 12:16:49 AM


by: neuzhou

[dead]

4/14/2026, 5:15:50 AM


by: rapidslug

[dead]

4/13/2026, 9:16:56 PM


by: cookiengineer

The fun part is that Google Safebrowsing doesn&#x27;t even flag the malicious company&#x27;s website.<p>And on their pricing page they offer all plugins as a bundle for 0 USD per year! What a steal! &#x2F;s<p>Don&#x27;t click on this, I would assume it may contain malware: <a href="https:&#x2F;&#x2F;essentialplugin[.]com&#x2F;pricing&#x2F;" rel="nofollow">https:&#x2F;&#x2F;essentialplugin[.]com&#x2F;pricing&#x2F;</a>

4/14/2026, 3:22:31 AM


by: photochemsyn

[flagged]

4/13/2026, 10:44:22 PM


by: nullbyte

[flagged]

4/13/2026, 6:27:15 PM


by: cold_tom

[flagged]

4/13/2026, 8:24:16 PM


by: pluc

Was it Automattic again?

4/13/2026, 7:37:49 PM


by:

4/13/2026, 7:13:32 PM