The Latest in IT Security

WordPress plugins Trojanised, spotted, fixed


WordPress just announced that the source code of three plugins for its popular blog-hosting software was maliciously modified.

Plugins consist of add-in modules which you install on your WordPress server in order to implement additional functionality, instead of writing all the needed code yourself.

Where you might use a DLL with a Windows program – for example, to add a feature such as SSL support or an edit control into an existing application – you’d use a plugin with WordPress.

DLLs are usually written in a language such as C or C++ and compiled into native machine code; WordPress plugins are generally written in a mixture of JavaScript, PHP, HTML and CSS.

According to WordPress, the modified plugins were Trojanised to include backdoors.

Web-based backdoors can be extremely dangerous. If you’re a WordPress user, you’ll know that the WordPress platform includes a complete and powerful administration interface, password-protected, via a URL such as “site.example/wp-admin”. A WordPress backdoor might offer something with similar functionality, but using a different, unexpected, URL, and using a password known to the hacker, instead of to you.

WordPress pluginsAs far as I can see, this attack doesn’t affect you or your users unless:

* You run your own installation of the WordPress platform.

* You use one of these plugins: AddThis, WPtouch, or W3 Total Cache.

* You updated your installed copy of one of those plugins in the past 48 hours from

(WordPress says “in the past day”, but its post is dated simply 21 June 2011. So I’ve boosted that “day” to 48 hours to cover all reasonable interpretations of the WordPress statement. If you changed one of the abovementioned plugins inside a 48-hour window, why not check with WordPress exactly when the danger period was?)

The unwanted source changes have been reversed out, so the very latest versions of the affected plugins are now safe. If you installed a defective one, update it right away and you’ll be safe again.

All passwords for the Support forums, WordPress Trac, and the repository have been force-reset. (This means you have to reset your password, just as you would if you forgot it.)

WordPress also temporarily blocked all access to the plugin repository and verified that no other plugins has been Trojanised.

A good response following criminal behaviour.

So, if you’re a WordPress user, don’t freak out when you’re asked to reset your password on your next login. And please take WordPress’s advice:

As a user, make sure to never use the same password for two different services, and we encourage you not to reset your password to be the same as your old one.

(Note. Naked Security runs on the WordPress platform, but we don’t use We’re hosted by VIP on We checked with WordPress, and they’ve confirmed that no plugins in the VIP infrastructure were affected. No danger, Will Robinson.)

Leave a reply



Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...



Latest Comments