Millions of WordPress sites just got hacked... again

Millions of WordPress sites just got hacked... again

April 16, 2026 β€’ 5 min
πŸ“Ί Watch Now

πŸ€– AI Summary

Overview

This episode dives into a major security breach involving 31 WordPress plugins, exploring the vulnerabilities of WordPress's plugin architecture and the implications of a sophisticated supply chain attack. It also introduces Cloudflare's Mdash project, a potential alternative to WordPress, designed to address plugin security flaws.

Notable Quotes

- One minute your countdown timer ultimate plugin is converting sales on your website, then the next minute it becomes a remote control demon on your server. – On the chaos caused by the WordPress plugin hack.

- No, no, don't touch me there. This is my no square. – On how Mdash restricts plugin access to sensitive data.

- The craziest thing to me is how quickly developers can roll out complete replacements for frameworks that have been around forever. – Reflecting on the rapid evolution of development tools and frameworks.

πŸ› οΈ WordPress Plugin Vulnerabilities

- WordPress plugins are essentially PHP scripts with full privileges, lacking sandboxing or isolation, making them inherently insecure.

- 96% of WordPress vulnerabilities stem from its plugin system, highlighting the risks of trusting third-party developers.

- The recent attack involved a hacker purchasing plugins legitimately, inserting backdoors, and activating malicious payloads via routine updates.

- Sensitive files like wpconfig.php were compromised, with attackers leveraging Ethereum smart contracts for dynamic command-and-control domains.

πŸ’» Supply Chain Attack Details

- The hacker acquired plugins through Flippa, paying an estimated six-figure sum to gain control.

- Malicious code was dormant for months before activation, bypassing traditional phishing detection methods.

- WordPress removed the compromised plugins, but the damage had already infiltrated systems, showcasing the dangers of supply chain compromises.

🌐 Cloudflare’s Mdash Project

- Mdash is a WordPress alternative built on the Astro project, using AI-generated JavaScript instead of PHP.

- It introduces sandboxing for plugins, restricting access to sensitive data and requiring explicit permissions via manifests.

- Mdash aims to address WordPress's security flaws but is unlikely to replace WordPress entirely in the near future.

πŸ€– The Role of AI in Development

- Modern AI coding tools like Warp enable rapid development of frameworks, making replacements for legacy systems feasible.

- Warp’s universal agent support enhances productivity by organizing coding agents and providing real-time notifications.

- The episode underscores the transformative impact of AI on software development workflows.

AI-generated content may not be accurate or complete and should not be relied upon as a sole source of truth.

πŸ“‹ Video Description

Warp is the agentic development environment born out of the terminal. Download Warp for free today at β†’ https://go.warp.dev/fireship

Someone spent $100k buying a massive collection of WordPress plugins and planted a backdoor in all of them. Naturally, CloudFlare stepped in with EmDash: a slop-forked WP alternative that promises to fix plugin security for good.

#coding #programming #wordpress

πŸ”– Topics Covered
- Wordpress plugin hack
- EmDash

πŸ“š Resources
- https://www.wordfence.com/threat-intel/vulnerabilities/wordpress-plugins/accordion-and-accordion-slider/accordion-and-accordion-slider-146-injected-backdoor
- https://anchor.host/someone-bought-30-wordpress-plugins-and-planted-a-backdoor-in-all-of-them/

Want more Fireship?

πŸ—žοΈ Newsletter: https://bytes.dev
🧠 Courses: https://fireship.dev