A Hidden Backdoor Just Hit Thousands of WordPress Sites
If your business runs on WordPress, this is one of those stories you need to read to the end. Dozens of popular WordPress plugins were quietly pulled offline after security researchers discovered a backdoor buried in their source code. That backdoor was used to push malicious code to every website running those plugins.
This wasn't a hack in the traditional sense. Nobody broke through a firewall or guessed a password. Someone bought the plugins, waited, and then weaponized them from the inside. That's what makes it so dangerous, and so hard to catch.
What Actually Happened
The attack was traced back to a company called Essential Plugin, which lists more than 400,000 plugin installs and over 15,000 customers on its website. According to Anchor Hosting founder Austin Ginder, who first sounded the alarm publicly, a new owner purchased Essential Plugin last year. Not long after the sale, a backdoor was quietly added to the plugins' source code.
The backdoor sat completely dormant for months. Then, earlier this month, it activated and started pushing malicious code to any WordPress installation that had one of the affected plugins installed. WordPress' own plugin directory confirmed the plugins appear in over 20,000 active installations.
WordPress has since removed the affected plugins from its directory and marked their closure as permanent. But removal from the directory does not remove them from your website. If you installed one of these plugins before they were pulled, it could still be sitting on your site right now.
This Is a Supply Chain Attack, and It's Not New
Security researchers have warned about this type of attack for years. The idea is straightforward: instead of attacking thousands of individual websites one by one, a malicious actor buys a trusted piece of software that already has access to those websites. One purchase, one code change, and suddenly tens of thousands of sites are compromised.
Ginder noted that this is actually the second WordPress plugin hijack discovered in as many weeks. This is not a one-off incident. It's a pattern, and WordPress's current ownership notification system makes it worse. When a plugin changes hands, WordPress does not notify site owners. You could be running a plugin that was sold to a bad actor last month and have absolutely no way of knowing.
Why WordPress Plugins Carry This Risk
Plugins are what make WordPress flexible. A local Kailua restaurant can add an online reservation form. A Kapolei contractor can build out a project gallery. A Honolulu retail shop can run a full e-commerce store. All of that is possible because plugins extend what WordPress can do out of the box.
The tradeoff is access. When you install a plugin, you're granting it a significant level of permission inside your WordPress installation. A legitimate plugin uses that access to add features. A malicious one can use it to inject code, steal data, create backdoor admin accounts, or redirect your visitors to phishing pages.
Most WordPress site owners install a plugin once and never think about it again. Plugin debt builds up over time, ownership of those plugins changes without any notice, and security vulnerabilities accumulate quietly in the background. This attack is a sharp reminder of what that neglect can cost.
What You Should Do Right Now
First, check your installed plugins against Ginder's list of affected plugins, which he published in his original blog post. If you have any of the flagged plugins installed, remove them immediately. Deactivating is not enough; delete them entirely.
Second, audit every plugin on your site. Ask yourself a few honest questions:
Is this plugin still actively maintained by a reputable developer?
When was it last updated?
Do you even know what this plugin does anymore?
Has the plugin's ownership or company name changed recently?
Third, check your site for signs of compromise. Unexpected admin accounts, unfamiliar code in your theme files, redirects sending visitors somewhere else, and sudden drops in Google rankings can all be indicators that something was injected.
If you're not comfortable doing any of this yourself, that's a completely reasonable position. WordPress site management is not as simple as it looks from the outside, and a compromised site can do real damage to your business and your customers.
The Honest Case for Moving Off WordPress
We work with a lot of small businesses across Oahu, and WordPress comes up constantly. It's the platform many people started on because it was affordable and accessible. That still holds true for some use cases.
But situations like this one are exactly why we talk so often about the long-term cost of staying on a WordPress installation that isn't actively maintained. Plugins accumulate. Ownership changes. Updates get skipped. And one day, a dormant backdoor wakes up and your customers are the ones who pay the price.
Converting an aging WordPress site to a modern, more controlled stack eliminates the plugin dependency problem at its root. Fewer moving parts means fewer attack surfaces. You get a faster, more secure site without the ongoing anxiety of wondering whether one of your installed plugins just got sold to someone with bad intentions.
That said, if WordPress is working well for your business and you have a solid maintenance plan in place, the most important thing right now is to act on this specific threat. Don't wait on this one.
Stay Ahead of the Next One
Supply chain attacks on WordPress plugins are becoming more common, not less. The best defense is a combination of regular audits, a minimal plugin footprint, and someone keeping an eye on your site who actually knows what to look for.
If you're not sure whether your Oahu business website is affected, or if you've been meaning to get a real security review done, now is a good time to make that call. Reach out to us at (808) 470-7900 or request a free site audit and we'll take a look at what you're working with.