ZeroToWP
newsby Marvin

Smart Slider 3 Pro Hit by Supply-Chain Attack: What WordPress Users Must Do Now

Share this article

Smart Slider 3 Pro Hit by Supply-Chain Attack: What WordPress Users Must Do Now

If you use Smart Slider 3 Pro and your site auto-updated between April 7 and April 8, 2026, read this now. The update you received was not from Nextend — it was a fully weaponized backdoor pushed through Nextend's own update infrastructure. Any site running Smart Slider 3 Pro v3.5.1.35 should be treated as compromised until proven otherwise.

Last updated April 18, 2026. This is the second WordPress supply-chain attack inside a single week, and Smart Slider 3 is installed on 800,000+ sites across its free and Pro editions.

Smart Slider 3 Pro backdoor attack April 2026 WordPress supply chain compromise

TL;DR

  • What happened: Nextend's update delivery infrastructure was compromised and a poisoned build of Smart Slider 3 Pro v3.5.1.35 shipped to customers on April 7, 2026.
  • Who is affected: Only the Pro version of Smart Slider 3 on WordPress. The free version on WordPress.org was not compromised. Joomla Pro users are also affected.
  • How to check: Open Plugins → Installed Plugins and look at Smart Slider 3 Pro. If you see 3.5.1.35, assume breach. 3.5.1.36 or later is the clean patch.
  • Immediate action: Update to 3.5.1.36 or later, then hunt for indicators of compromise (rogue admins, suspicious files in wp-content/mu-plugins and wp-includes, unknown wp_options rows).
  • If compromised: Rebuild from a pre-April-7 backup. Rotate every credential. A plugin update alone will not remove the backdoor.

Affiliate note: some of the security tool links in this post are affiliate links. I only recommend tools I would install on my own sites.

Attack Timeline

Here is the consolidated timeline based on reporting from The Hacker News, Patchstack's malware analysis, and Nextend's own advisory.

Date Event
April 5, 2026 (or earlier) Last known clean state. Nextend recommends restoring server backups from this date if available.
April 7, 2026 Attacker pushes Smart Slider 3 Pro v3.5.1.35 through Nextend's compromised update channel. Every site that clicked "update" received a trojanized build.
April 7, 2026 (~6 hours later) Compromise detected. Nextend shuts down its update servers and pulls the poisoned build.
April 9, 2026 Patchstack publishes its full malware analysis. Clean version 3.5.1.36 becomes available.
April 10, 2026 The Hacker News and other outlets break the story publicly.

Nextend has not published exact UTC timestamps. The ~6-hour window figure is consistent across Patchstack, The Hacker News, and Hedgehog Security reporting, but treat it as an estimate.

How the Attack Worked

This was not a vulnerability in Smart Slider's code. It was a supply-chain attack: an unauthorized party gained access to Nextend's update delivery infrastructure and published an attacker-authored build through the legitimate channel. Every customer whose site auto-updated installed the backdoor themselves, trusting the official distribution system.

The payload is not a single PHP shell. According to Patchstack's analysis, it is a staged RAT with multiple independent re-entry points, so removing one does not remove the others.

What the RAT actually does

  • Pre-auth shell. Executes OS commands when a request arrives with the X-Cache-Status header and a specific token value.
  • PHP eval backdoor. Runs arbitrary PHP via a hidden _chk GET parameter, with fallback command chains if the primary path is blocked.
  • Hidden admin. Creates a rogue admin (username pattern wpsvc_*, display name "WordPress Service") and hides it from the wp-admin Users list.
  • Must-use plugin drop. wp-content/mu-plugins/object-cache-helper.php auto-loads on every request regardless of active plugins.
  • Core-file injection. Drops wp-includes/class-wp-locale-helper.php and a wp-includes/.cache_key marker to survive plugin removal.
  • Theme infection. Appends code referencing the option key _wpc_ak to the active theme's functions.php.
  • C2 registration + credential exfil. On first run, POSTs to wpjs1[.]com (endpoint /api/v3/register-agent) with the site URL, a generated secret key, hostname, Smart Slider/WordPress/PHP versions, admin email, database name, server software, the rogue admin's plaintext username and password, and the full persistence inventory.

Indicators of compromise (sanitized)

The following IoCs have been reported publicly. I am keeping the C2 domain defanged. Do not visit it from a browser without isolation.

  • Files: wp-content/mu-plugins/object-cache-helper.php, wp-includes/class-wp-locale-helper.php, wp-includes/.cache_key
  • Options table rows: _wpc_ak (24 hex character key), _wpc_uid, _wpc_uinfo (base64)
  • Rogue admin pattern: username wpsvc_*, email reported as kiziltxt2[at]gmail[dot]com
  • C2 host: wpjs1[.]com — block at firewall and DNS
  • Trigger header: X-Cache-Status with a specific token value
  • Trigger GET parameter: _chk

How to Check If You Were Affected

Work through these checks in order. Any single positive means you should treat the site as compromised.

  1. Check the plugin version. In Plugins → Installed Plugins: below 3.5.1.35 was never exposed, exactly 3.5.1.35 is poisoned, 3.5.1.36+ is the clean patch. Updating from 3.5.1.35 to 3.5.1.36 does not remove the backdoor — it only stops new infections.
  2. Check your update log. In WP Activity Log or your host's audit trail, look for a Smart Slider 3 Pro update between April 7 and April 8, 2026.
  3. Look for unexpected files via SFTP: wp-content/mu-plugins/object-cache-helper.php, wp-includes/class-wp-locale-helper.php, wp-includes/.cache_key. None of these exist on a clean install.
  4. Grep the active theme's functions.php for _wpc_ak.
  5. Audit user accounts. Query wp_users directly (the wp-admin list may be filtered) for wpsvc_* usernames, the email kiziltxt2@gmail.com, or display name "WordPress Service".
  6. Check the options table for _wpc_ak, _wpc_uid, _wpc_uinfo.
  7. Check outbound DNS for connections to wpjs1.com.
  8. Check cron jobs. Run wp cron event list and treat anything unfamiliar as suspect.

If You're Affected: Recovery Steps

A plugin update does not remove a backdoor that has already written to your theme, mu-plugins, core files, options table, and user table. You need a full recovery.

  1. Take the site offline (maintenance mode or host-level 503) so the attacker cannot keep operating while you clean up.
  2. Restore from a backup dated April 5, 2026 or earlier — Nextend's recommended path. A pre-breach restore beats manual cleanup.
  3. If no clean backup exists: remove the IoC files, purge the three _wpc_* options, delete rogue admins, and revert functions.php. Scan with at least two independent tools afterwards.
  4. Rotate every credential: WordPress admins, DB password, SFTP/SSH, hosting panel, and anything in wp-config.php.
  5. Regenerate auth keys and salts in wp-config.php using the WordPress.org salt generator — this invalidates every existing session.
  6. Reinstall Smart Slider 3 Pro cleanly at version 3.5.1.36 or later.
  7. Rotate API keys and webhooks — Stripe, Mailchimp, SMTP, CDN tokens. Assume anything stored in the database or wp-config.php is known to the attacker.
  8. Scan with a reputable scanner. Wordfence, MalCare, and Sucuri all have signatures for this campaign.
  9. Monitor for two weeks — re-scan daily and watch for new admin accounts or unexpected outbound traffic.

How Supply-Chain Attacks Bypass "Updated Plugin" Security

For years the standard WordPress advice has been "keep plugins updated." That advice is still correct — most WordPress breaches start with an out-of-date plugin, not a poisoned one. But this incident exposes the edge case where fast updates actively hurt you.

In a supply-chain attack, malicious code arrives through the vendor's own trusted distribution channel. Your site cannot tell a legitimate update from a hijacked one, because both are served from the vendor's servers. WordPress does not currently enforce reproducible builds or independent signing for paid-plugin updates delivered outside WordPress.org, so trust is transitive — you trust Smart Slider, Smart Slider trusts its own update server, and a breached server means a breached site.

The practical takeaway is not "stop updating." It is "stop updating instantly." Staggering by 48 to 72 hours would have prevented almost every 3.5.1.35 infection, because the poisoned build was only live for about six hours.

Preventing Future Supply-Chain Attacks

You cannot stop a vendor being breached. You can shrink your blast radius when one is.

  • Stagger auto-updates. Disable auto-updates on premium plugins and apply them manually 48–72 hours after release, unless the update is an active security fix.
  • Vulnerability intelligence feed. Patchstack maintains a real-time WordPress vulnerability and supply-chain database.
  • Firewall + malware scanner. Wordfence catches many RAT-style post-exploitation behaviors even when the initial dropper is signed.
  • Cleanup fallback. MalCare is built around automated one-click cleanup — useful at 2 AM.
  • Platform-level WAF. Sucuri's WAF sits in front of the origin and can block IoC-matching requests before they hit PHP.
  • Activity log. A plugin-update log lets you match your site against incident timelines quickly.
  • Daily off-site backups. The single best recovery in this incident was "restore from April 5 or earlier" — only possible if you have that backup.

For a broader baseline, work through my WordPress security complete guide, harden your WordPress login, and compare options in my best WordPress security plugins roundup.

Connection to the Essential Plugin Attack

This is the second WordPress supply-chain attack inside a single week. Just days earlier, the same pattern played out with a different plugin — see my writeup of the Essential Plugin supply-chain attack. Two independent vendors, two compromised update channels, two RAT payloads with credential exfiltration. The through-line is that paid-plugin update infrastructure in the WordPress ecosystem largely lacks independent signing and reproducible-build verification. Plugin provenance — "where did this code really come from, and can I verify it?" — is going to be one of the defining WordPress security conversations of 2026.

Frequently Asked Questions

Which Smart Slider version is affected?

Only Smart Slider 3 Pro v3.5.1.35 for WordPress and its Joomla counterpart. Anything below 3.5.1.35 was never exposed. Version 3.5.1.36 and later is the clean patch.

Is the free Smart Slider 3 version affected?

No. The free version is distributed through the WordPress.org plugin repository and uses a different delivery path. Nextend and independent analysts have confirmed the free build was not compromised.

How long was the poisoned version live?

About six hours on April 7, 2026. Nextend has not published exact UTC timestamps. If your site auto-updated Smart Slider 3 Pro during that window, treat it as compromised.

How do I know if my site is actually compromised?

Running 3.5.1.35 at any point is the strongest signal. Confirm with a file-level search for object-cache-helper.php in wp-content/mu-plugins, a grep of your theme's functions.php for _wpc_ak, and a wp_users query for wpsvc_* usernames. Any one of those means breach.

Will updating to 3.5.1.36 remove the backdoor?

No. The backdoor writes to files and database rows outside the Smart Slider plugin directory. Updating stops new malicious code from arriving, but you still have to do the cleanup or restore from a pre-April-7 backup.

Should I switch away from Smart Slider?

Not automatically. Nextend's response — shutting down update servers, releasing a clean patch, and publishing an advisory — has been reasonable. The real lesson is about your own update policy, not this specific vendor.

Was data exfiltrated from my site?

If you ran 3.5.1.35, assume yes. The malware POSTs admin credentials, database name, site metadata, and a generated backdoor key to an external C2 on first run. Rotate every credential stored on the site.

Primary Sources

Marvin

Written by Marvin

Our team tests and reviews WordPress products to help beginners make confident choices.

Learn more about our team →

You might also like

Leave A Reply

Thanks for choosing to leave a comment. All comments are moderated, and your email address will NOT be published. Please do NOT use keywords in the name field.