All news

Smart Slider 3 Pro Backdoor via Nextend Server Breach

Smart Slider 3 Pro Backdoor via Nextend Server Breach

Attackers distributed a backdoored Smart Slider 3 Pro update through compromised Nextend servers. Here's what WordPress site owners need to check now.

April 10, 2026VibeWShield News Agentthehackernews.com
Editorial note: This article was generated by VibeWShield's AI news agent based on the original report. It has been reviewed for accuracy but may contain AI-generated summaries. Always verify critical details from the original source.

A backdoored version of Smart Slider 3 Pro was distributed through compromised Nextend update servers, putting thousands of WordPress installations at risk of silent code execution. The Smart Slider 3 Pro backdoor was embedded inside what appeared to be a legitimate plugin update, meaning sites with automatic updates enabled pulled down the malicious payload without any user interaction.

This is a textbook supply chain attack. The attacker did not need to compromise individual sites. They compromised the distribution point instead, and let the update mechanism do the rest.

How the Backdoored Smart Slider 3 Pro Update Worked

Nextend's update servers were compromised, allowing attackers to swap out legitimate plugin archives with modified ones containing injected PHP backdoors. When a WordPress site requested the latest version of Smart Slider 3 Pro, it received the tampered package.

The injected code typically takes one of a few forms in these attacks: a web shell disguised inside a plugin file, a remote code execution hook registered on WordPress action hooks like init or wp_loaded, or an obfuscated eval block hidden inside an otherwise normal-looking PHP class. Without diffing the plugin files against a known-clean version, the malicious code is easy to miss.

The update was cryptographically signed by Nextend's own infrastructure because the servers themselves were compromised. Standard signature verification offered no protection here.

What's at Risk for WordPress Developers and Site Owners

Any WordPress installation running Smart Slider 3 Pro that received updates during the window of server compromise is potentially backdoored. That means attackers may have:

  • Full PHP code execution on your server
  • Access to your WordPress database credentials via wp-config.php
  • The ability to create rogue admin accounts
  • Persistent access even after the plugin is updated or removed (if a secondary implant was dropped to disk)

Sites running managed WordPress hosting with automatic plugin updates are at the highest exposure. Shared hosting environments could see lateral movement between accounts if the server-level file permissions are not properly isolated.

How to Check if Your Site Was Affected

Start by checking your plugin update logs or server access logs for any update pull from Nextend's servers during the compromised window. Compare your current Smart Slider 3 Pro files against the official clean release using a file integrity tool or a manual diff.

Specifically, look for:

  • Unexpected eval(), base64_decode(), or gzinflate() calls in plugin PHP files
  • New PHP files in the plugin directory that were not in the original release
  • WordPress admin users you did not create
  • Outbound connections from your server to unfamiliar IPs logged in your WAF or hosting panel

If you find anything suspicious, treat the site as fully compromised. Restore from a backup predating the update window, rotate all credentials, and audit your database for injected content.

Protecting Against Plugin Supply Chain Attacks

Supply chain attacks targeting plugin update servers are increasingly common. The standard advice to keep plugins updated still holds, but it needs to be paired with verification.

Use a DAST scanner to detect active backdoors and anomalous behavior on your live site, especially after applying plugin updates. Complement this with server-side file integrity monitoring so unexpected file changes trigger alerts before an attacker has time to establish persistence.

Where possible, mirror plugin updates through a controlled internal repository where your team can inspect diffs before deployment. This slows down the update cycle slightly but significantly reduces exposure to this class of attack.


Does removing the plugin remove the backdoor? Not necessarily. If the backdoor dropped additional files outside the plugin directory or modified core WordPress files, removing the plugin leaves those artifacts behind. Always do a full file system audit.

How do I verify a clean version of Smart Slider 3 Pro? Download the last known-good release directly from Nextend's official site after they confirm server remediation, then diff it against your installed files using a tool like diff -r or a WordPress integrity plugin.

Should I disable automatic plugin updates after this? Disabling auto-updates reduces supply chain risk but increases exposure to unpatched vulnerabilities. A better approach is to route updates through a staging environment where you can inspect changes before pushing to production.


Run a full backdoor and vulnerability scan on your WordPress site at VibeWShield.

Free security scan

Is your app vulnerable to similar attacks?

VibeWShield automatically scans for these and 18 other security checks in under 3 minutes.

Scan your app free