WORDPRESS PLUGIN HARBORED SECRET BACKDOOR FOR 5 YEARS
INDUSTRY DESK■ 2 MIN READ
THU, APR 30, 2026■ AI-SUMMARIZED FROM 1 SOURCE BELOW
The Quick Page/Post Redirect plugin, installed on over 70,000 WordPress sites, contained a hidden backdoor that remained dormant for five years. The vulnerability allows attackers to inject arbitrary code directly into affected websites.
Security researchers discovered the backdoor in the Quick Page/Post Redirect plugin, a widely-used tool for managing URL redirects on WordPress sites. The malicious code was inserted approximately five years ago and went undetected until recently.
The backdoor's functionality enables unauthorized code injection, potentially giving attackers full control over compromised websites. This could lead to data theft, malware distribution, site defacement, or other malicious activities.
With over 70,000 active installations, the plugin's widespread adoption amplified the potential impact of the vulnerability. The dormant nature of the backdoor—remaining inactive until triggered—likely contributed to its extended undetection.
Plugin developers have released security patches addressing the vulnerability. WordPress site administrators using the Quick Page/Post Redirect plugin should update immediately to the patched version.
This incident underscores ongoing security risks within the WordPress plugin ecosystem. While the open-source WordPress platform and its plugins enable flexibility and extensibility, they also present attack surfaces when security is overlooked. Third-party plugins vary widely in security practices and maintenance quality.
Administrators are advised to:
- Update the Quick Page/Post Redirect plugin to the latest version
- Conduct security audits on affected sites
- Review access logs for suspicious activity
- Consider limiting plugin installations to essential, actively-maintained tools
- Enable regular WordPress security monitoring
The discovery highlights the importance of regular security reviews for popular plugins and the need for developers to maintain scrutiny over code changes and contributions.
■ MORE FROM THE SECURITY DESK
OpenAI is launching GPT-5.5-Cyber, a specialized cybersecurity model restricted to vetted "cyber defenders" rather than the general public. The limited rollout begins within days.
JUST NOW— AI Desk
A critical authentication bypass vulnerability in cPanel, WHM, and WP Squared is being actively exploited in the wild since late February. A proof-of-concept is now publicly available.
JUST NOW— AI Desk
International authorities dismantled nine cryptocurrency investment fraud operations and arrested 276 suspects in a coordinated crackdown. The operation involved U.S. and Chinese law enforcement agencies targeting organized crypto scams.
JUST NOW— Industry Desk
Two Republican-led House committees are investigating Airbnb and Cursor maker Anysphere for their use of Chinese artificial intelligence models. The probes reflect broader congressional efforts to limit national security risks and counter China's AI advancement.
4H AGO— AI Desk