Backdoored Smart Slider 3 Pro Update Distributed via Compromised Nextend Servers
Overview
Attackers have compromised the update system for the Smart Slider 3 Pro plugin, a widely used tool for WordPress and Joomla, allowing them to distribute a malicious version containing a backdoor. This incident affects users of Smart Slider 3 Pro version 3.5.1.35 for WordPress, which has over 800,000 active installations. The backdoor could potentially allow unauthorized access to affected websites, putting sensitive data at risk. Users are urged to check their installations and ensure they are using a secure version of the plugin to prevent exploitation. This incident serves as a reminder of the vulnerabilities in third-party update systems and the importance of maintaining software security.
Key Takeaways
- Active Exploitation: This vulnerability is being actively exploited by attackers. Immediate action is recommended.
- Affected Systems: Smart Slider 3 Pro version 3.5.1.35 for WordPress
- Action Required: Users should update to the latest version of Smart Slider 3 Pro to ensure they are not using the compromised version.
- Timeline: Newly disclosed
Original Article Summary
Unknown threat actors have hijacked the update system for the Smart Slider 3 Pro plugin for WordPress and Joomla to push a poisoned version containing a backdoor. The incident impacts Smart Slider 3 Pro version 3.5.1.35 for WordPress, per WordPress security company Patchstack. Smart Slider 3 is a popular WordPress slider plugin with more than 800,000 active installations across its free and Pro
Impact
Smart Slider 3 Pro version 3.5.1.35 for WordPress
Exploitation Status
This vulnerability is confirmed to be actively exploited by attackers in real-world attacks. Organizations should prioritize patching or implementing workarounds immediately.
Timeline
Newly disclosed
Remediation
Users should update to the latest version of Smart Slider 3 Pro to ensure they are not using the compromised version.
Additional Information
This threat intelligence is aggregated from trusted cybersecurity sources. For the most up-to-date information, technical details, and official vendor guidance, please refer to the original article linked below.
Related Topics: This incident relates to Update.