Home » Security News » Quick Page/Post Redirect Plugin Hit by Major Suppl...

Quick Page/Post Redirect Plugin Hit by Major Supply Chain Attack, 70,000 Sites at Risk

Quick Page/Post Redirect Plugin Hit by Major Supply Chain Attack, 70,000 Sites at Risk

Add Techlomedia as a preferred source on Google. Preferred Source

A major supply chain attack has been discovered in the Quick Page/Post Redirect Plugin, a widely used WordPress plugin with more than 70,000 active installations. The issue has raised serious concerns about plugin security and trust in the WordPress ecosystem.

Security researcher Austin Ginder uncovered a hidden backdoor that had been sitting inside the plugin for nearly five years. This backdoor was designed to quietly inject malicious code into websites without being noticed.

The problem came to light during routine security checks. Some websites reported running version 5.2.3 of the plugin, but their file signatures did not match the official version available on the WordPress repository. This mismatch raised red flags and led to a deeper investigation.

Researchers found that the plugin had been tampered with. It included a hidden function that connected to a third-party server and injected content directly into website pages. This content was not visible to site administrators. Instead, it only appeared to regular visitors and search engine crawlers. This made it useful for parasite SEO campaigns and harder to detect.

The attack used a multi-stage approach with two separate backdoors. The first one was an active backdoor. It used a custom plugin update checker that connected to a server controlled by the attacker instead of the official WordPress update system. This allowed the attacker to push malicious updates with full control.

The second was a passive backdoor. It fetched hidden content from a remote command-and-control server and displayed it on affected websites. Even though this server is currently offline, the update mechanism is still active and could be used again.

Further investigation revealed that this was not an external hack. The attack appears to be an inside job. The plugin’s original developer, known as anadnet, reportedly added the malicious update system to the official repository in late 2020. This allowed the compromised code to spread to thousands of websites.

Later, the developer removed the updater from the official codebase. However, by that time, many installations were already connected to the attacker’s private server. This step helped hide the attack while keeping affected sites under control.

In response, the WordPress plugin review team removed the plugin from the directory in April 2026. The investigation is still ongoing.

As someone working closely in security research, I can see how supply chain attacks are evolving. This type of attack is hard to detect. Attackers can fake version numbers, which makes standard vulnerability scanners less effective. So, administrators are advised to manually verify plugin files using WordPress command-line tools. If there is any mismatch, the plugin should be removed immediately.

Website owners should not rely only on automated tools. It is important to verify plugin checksums regularly, monitor unusual outbound requests, and avoid installing unnecessary plugins. Even plugins from trusted sources should be reviewed carefully.

Follow Techlomedia on Google News to stay updated. Follow on Google News

Affiliate Disclosure:

This article may contain affiliate links. We may earn a commission on purchases made through these links at no extra cost to you.

Deepanker Verma

About the Author: Deepanker Verma

Deepanker Verma is the Founder and Editor-in-Chief of TechloMedia. He holds Engineering degree in Computer Science and has over 15 years of experience in the technology sector. Deepanker bridges the gap between complex engineering and consumer electronics. He is also a a known Security Researcher acknowledged by global giants including Apple, Microsoft, and eBay. He uses his technical background to rigorously test gadgets, focusing on performance, security, and long-term value.

Related Posts

Stay Updated with Techlomedia

Join our newsletter to receive the latest tech news, reviews, and guides directly in your inbox.