{"id":4092,"date":"2026-04-16T08:32:50","date_gmt":"2026-04-16T06:32:50","guid":{"rendered":"https:\/\/computershop.eu\/blog\/?p=4081"},"modified":"2026-04-16T08:42:43","modified_gmt":"2026-04-16T06:42:43","slug":"cyberattaque-contre-wordpress-plugins-compromis","status":"publish","type":"post","link":"https:\/\/computershop.eu\/blog\/fr\/cyberattaque-contre-wordpress-plugins-compromis","title":{"rendered":"Cyberattaque contre WordPress, plugins compromis"},"content":{"rendered":"<span class=\"span-reading-time rt-reading-time\" style=\"display: block;\"><span class=\"rt-label rt-prefix\">Reading Time: <\/span> <span class=\"rt-time\"> 3<\/span> <span class=\"rt-label rt-postfix\">minutes<\/span><\/span>\n<p>Un nouvel incident de s\u00e9curit\u00e9 met en \u00e9vidence les vuln\u00e9rabilit\u00e9s de l&#8217;\u00e9cosyst\u00e8me WordPress, l&#8217;une des plateformes de cr\u00e9ation de sites web les plus populaires au monde. Des dizaines de plugins utilis\u00e9s par des milliers de sites web ont \u00e9t\u00e9 retir\u00e9s apr\u00e8s la d\u00e9couverte d&#8217;une porte d\u00e9rob\u00e9e dangereuse, utilis\u00e9e pour injecter du code malveillant.<\/p>\n\n\n\n<p>WordPress continue d&#8217;\u00eatre une cible majeure pour les cyberattaques sophistiqu\u00e9es. Apr\u00e8s de r\u00e9cents incidents o\u00f9 des plugins populaires ont \u00e9t\u00e9 compromis et utilis\u00e9s pour distribuer du code malveillant, de nouvelles recherches montrent une tendance encore plus dangereuse : <strong>des portes d\u00e9rob\u00e9es cach\u00e9es qui cr\u00e9ent des comptes administrateur \u00e0 l&#8217;insu des utilisateurs<\/strong>.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Attaques via les plugins : une vuln\u00e9rabilit\u00e9 majeure<\/h3>\n\n\n\n<p>Le cas des plugins compromis (tels que Essential Plugin) met en \u00e9vidence une m\u00e9thode appel\u00e9e <em>attaque par la cha\u00eene d&#8217;approvisionnement<\/em>. Les attaquants ach\u00e8tent ou compromettent des logiciels l\u00e9gitimes et introduisent du code malveillant dans des mises \u00e0 jour apparemment s\u00fbres. Ce code peut rester latent, puis s&#8217;activer pour infecter des milliers de sites simultan\u00e9ment.<\/p>\n\n\n\n<p>Les plugins WordPress ont un acc\u00e8s \u00e9tendu au syst\u00e8me, ce qui les rend extr\u00eamement attrayants pour les pirates. De plus, les utilisateurs ne sont pas avertis lorsqu&#8217;un plugin change de propri\u00e9taire, ce qui augmente le risque de compromission.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Portes d\u00e9rob\u00e9es cach\u00e9es : la menace invisible<\/h3>\n\n\n\n<p>Selon une analyse publi\u00e9e par <a href=\"https:\/\/www.bitdefender.com\/en-us\/blog\/hotforsecurity\/hidden-wordpress-backdoors-admin-accounts\" target=\"_blank\" rel=\"noreferrer noopener\">Bitdefender<\/a>, les attaquants utilisent des techniques de plus en plus sophistiqu\u00e9es pour maintenir un acc\u00e8s \u00e0 long terme aux sites WordPress.<\/p>\n\n\n\n<p>Un exemple est le faux plugin \u00ab DebugMaster Pro \u00bb, qui se pr\u00e9sente comme un outil l\u00e9gitime, mais en r\u00e9alit\u00e9 :<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>cr\u00e9e <strong>des comptes administrateur cach\u00e9s<\/strong> avec des donn\u00e9es pr\u00e9d\u00e9finies<\/li>\n\n\n\n<li>transmet des informations sensibles \u00e0 des serveurs contr\u00f4l\u00e9s par les attaquants<\/li>\n\n\n\n<li>se cache de la liste des plugins pour \u00e9viter la d\u00e9tection.<\/li>\n<\/ul>\n\n\n\n<p>De plus, d&#8217;autres fichiers malveillants peuvent recr\u00e9er automatiquement les comptes d&#8217;administrateur m\u00eame s&#8217;ils sont supprim\u00e9s par l&#8217;administrateur du site.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Pourquoi ces attaques sont-elles si dangereuses ?<\/h3>\n\n\n\n<p>Une fois qu&#8217;un attaquant obtient un acc\u00e8s administrateur, il peut :<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>modifier compl\u00e8tement le contenu du site<\/li>\n\n\n\n<li>injecter des logiciels malveillants ou des publicit\u00e9s spam<\/li>\n\n\n\n<li>voler les donn\u00e9es des utilisateurs<\/li>\n\n\n\n<li>rediriger les visiteurs vers des pages dangereuses.<\/li>\n<\/ul>\n\n\n\n<p>Dans certains cas, les sites compromis peuvent continuer \u00e0 fonctionner apparemment normalement, tout en ex\u00e9cutant du <a href=\"https:\/\/computershop.eu\/blog\/fr\/hwmonitor-et-cpu-z-infectees-par-des-logiciels-malveillants\" target=\"_blank\" rel=\"noreferrer noopener\">code malveillant<\/a> en arri\u00e8re-plan, ce qui rend la d\u00e9tection extr\u00eamement difficile.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Signes que votre site WordPress est compromis<\/h3>\n\n\n\n<p>Il est important d&#8217;\u00eatre attentif aux indices tels que :<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>l&#8217;apparition de comptes administrateur inconnus<\/li>\n\n\n\n<li>des plugins ou des fichiers suspects<\/li>\n\n\n\n<li>des redirections \u00e9tranges ou du contenu modifi\u00e9<\/li>\n\n\n\n<li>des performances r\u00e9duites ou un trafic inhabituel.<\/li>\n<\/ul>\n\n\n\n<p>Les experts soulignent que ces portes d\u00e9rob\u00e9es sont sp\u00e9cialement con\u00e7ues pour rester ind\u00e9tect\u00e9es et pour persister m\u00eame apr\u00e8s des nettoyages partiels du site.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Comment prot\u00e9ger votre site WordPress<\/h3>\n\n\n\n<p>Pour r\u00e9duire les risques, suivez ces bonnes pratiques SEO et de s\u00e9curit\u00e9 :<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Installez uniquement des plugins provenant de sources fiables<\/li>\n\n\n\n<li>V\u00e9rifiez r\u00e9guli\u00e8rement les comptes d&#8217;utilisateurs<\/li>\n\n\n\n<li>Mettez constamment \u00e0 jour WordPress et les extensions<\/li>\n\n\n\n<li>Utilisez des solutions de s\u00e9curit\u00e9 d\u00e9di\u00e9es<\/li>\n\n\n\n<li>R\u00e9alisez des sauvegardes r\u00e9guli\u00e8res.<\/li>\n<\/ol>\n\n\n\n<p>Les attaques r\u00e9centes d\u00e9montrent que la s\u00e9curit\u00e9 de WordPress ne doit pas \u00eatre trait\u00e9e superficiellement. Des plugins compromis aux portes d\u00e9rob\u00e9es invisibles qui cr\u00e9ent des comptes administrateur, les menaces deviennent de plus en plus complexes.<\/p>\n\n\n\n<p>Si vous poss\u00e9dez un site WordPress, il est essentiel d&#8217;\u00eatre proactif : surveillez, mettez \u00e0 jour et s\u00e9curisez constamment. Dans l&#8217;environnement num\u00e9rique actuel, la pr\u00e9vention n&#8217;est plus une option, mais une n\u00e9cessit\u00e9.<\/p>\n\n\n\n<p>Source : <a href=\"https:\/\/anchor.host\/someone-bought-30-wordpress-plugins-and-planted-a-backdoor-in-all-of-them\/\" target=\"_blank\" rel=\"noreferrer noopener\">anchor.host<\/a>, <a href=\"https:\/\/www.bitdefender.com\/en-us\/blog\/hotforsecurity\/hidden-wordpress-backdoors-admin-accounts\" target=\"_blank\" rel=\"noreferrer noopener\">bitdefender.com<\/a><\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><a href=\"https:\/\/computershop.eu\/fr\/ordinateurs\/ordinateurs-tout-en-un\" target=\"_blank\" rel=\" noreferrer noopener\"><img loading=\"lazy\" decoding=\"async\" width=\"940\" height=\"788\" src=\"https:\/\/computershop.eu\/blog\/wp-content\/uploads\/2026\/04\/All-In-One-PC.png\" alt=\"All-In-One PC\" class=\"wp-image-4088\" style=\"aspect-ratio:1.1876926796832497;width:399px;height:auto\" srcset=\"https:\/\/computershop.eu\/blog\/wp-content\/uploads\/2026\/04\/All-In-One-PC.png 940w, https:\/\/computershop.eu\/blog\/wp-content\/uploads\/2026\/04\/All-In-One-PC-300x251.png 300w, https:\/\/computershop.eu\/blog\/wp-content\/uploads\/2026\/04\/All-In-One-PC-768x644.png 768w, https:\/\/computershop.eu\/blog\/wp-content\/uploads\/2026\/04\/All-In-One-PC-358x300.png 358w\" sizes=\"auto, (max-width: 940px) 100vw, 940px\" \/><\/a><\/figure>\n<\/div>\t<div class=\"quickshare-container\">\r\n\t<ul class=\"quickshare-genericons monochrome quickshare-effect-expand\">\r\n\t\t<li class=\"quickshare-share\">Share:<\/li> \r\n\t\t<li><a href=\"https:\/\/facebook.com\/sharer.php?u=https%3A%2F%2Fcomputershop.eu%2Fblog%2Ffr%2Fcyberattaque-contre-wordpress-plugins-compromis&amp;t=Cyberattaque+contre+WordPress%2C+plugins+compromis+<+Refurbished+Computers+-+ComputerShop.EU\" target=\"_blank\" title=\"Share on Facebook\"><span class=\"quickshare-facebook\">Facebook<\/span><\/a><\/li>\t\t<li><a href=\"https:\/\/twitter.com\/intent\/tweet?url=https%3A%2F%2Fcomputershop.eu%2Fblog%2Ffr%2Fcyberattaque-contre-wordpress-plugins-compromis&amp;text=Cyberattaque+contre+WordPress%2C+plugins+compromis+<+Refurbished+Computers+-+ComputerShop.EU\" target=\"_blank\" title=\"Share on Twitter\"><span class=\"quickshare-twitter\">Twitter<\/span><\/a><\/li>\t\t<li><a href=\"http:\/\/pinterest.com\/pin\/create\/button\/?url=https%3A%2F%2Fcomputershop.eu%2Fblog%2Ffr%2Fcyberattaque-contre-wordpress-plugins-compromis&amp;media=https%3A%2F%2Fcomputershop.eu%2Fblog%2Fwp-content%2Fuploads%2F2026%2F04%2Fwordpress-300x168.png&amp;description=Un+nouvel+incident+de+s%C3%A9curit%C3%A9+met+en+%C3%A9vidence+les+vuln%C3%A9rabilit%C3%A9s+de+l%27%C3%A9cosyst%C3%A8me+WordPress%2C+l%27une+des+plateformes+de+cr%C3%A9ation+de+sites+web+les+plus+populaires+au+monde.+Des+dizaines+de+plugins+utilis%C3%A9s+par+des+milliers+de+sites+web+ont+%C3%A9t%C3%A9+retir%C3%A9s%26hellip%3B\" target=\"_blank\" title=\"Share on Pinterest\"><span class=\"quickshare-pinterest\">Pinterest<\/span><\/a><\/li>\t\t<li><a href=\"http:\/\/linkedin.com\/shareArticle?mini=true&amp;url=https%3A%2F%2Fcomputershop.eu%2Fblog%2Ffr%2Fcyberattaque-contre-wordpress-plugins-compromis&amp;title=Cyberattaque+contre+WordPress%2C+plugins+compromis&amp;source=Refurbished+Computers+-+ComputerShop.EU&amp;summary=Un+nouvel+incident+de+s%C3%A9curit%C3%A9+met+en+%C3%A9vidence+les+vuln%C3%A9rabilit%C3%A9s+de+l%27%C3%A9cosyst%C3%A8me+WordPress%2C+l%27une+des+plateformes+de+cr%C3%A9ation+de+sites+web+les+plus+populaires+au+monde.+Des+dizaines+de+plugins+utilis%C3%A9s+par+des+milliers+de+sites+web+ont+%C3%A9t%C3%A9+retir%C3%A9s%26hellip%3B\" title=\"Share on Linkedin\" target=\"_blank\"><span class=\"quickshare-linkedin\">Linkedin<\/span><\/a><\/li>\t\t<li><a href=\"https:\/\/plus.google.com\/share?url=https%3A%2F%2Fcomputershop.eu%2Fblog%2Ffr%2Fcyberattaque-contre-wordpress-plugins-compromis\" target=\"_blank\" title=\"Share on Google+\"><span class=\"quickshare-googleplus\">Google+<\/span><\/a><\/li>\t\t\t\t\t\t\t\t<li><a href=\"mailto:?subject=Refurbished+Computers+-+ComputerShop.EU:+Cyberattaque+contre+WordPress%2C+plugins+compromis&amp;body=https%3A%2F%2Fcomputershop.eu%2Fblog%2Ffr%2Fcyberattaque-contre-wordpress-plugins-compromis\" target=\"_blank\" title=\"Share via Email\"><span class=\"quickshare-email\">Email<\/span><\/a><\/li>\t<\/ul>\r\n\t<\/div>\r\n","protected":false},"excerpt":{"rendered":"<p><span class=\"span-reading-time rt-reading-time\" style=\"display: block;\"><span class=\"rt-label rt-prefix\">Reading Time: <\/span> <span class=\"rt-time\"> 3<\/span> <span class=\"rt-label rt-postfix\">minutes<\/span><\/span>Un nouvel incident de s\u00e9curit\u00e9 met en \u00e9vidence les vuln\u00e9rabilit\u00e9s de l&#8217;\u00e9cosyst\u00e8me WordPress, l&#8217;une des plateformes de cr\u00e9ation de sites web les plus populaires au monde. Des dizaines de plugins utilis\u00e9s par des milliers de sites web ont \u00e9t\u00e9 retir\u00e9s &hellip; <a href=\"https:\/\/computershop.eu\/blog\/fr\/cyberattaque-contre-wordpress-plugins-compromis\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":4,"featured_media":4087,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[103],"tags":[7220,15273,15321,4233,15278,15324],"class_list":["post-4092","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-nouvelles","tag-cyberattaque","tag-cyberattaque-wordpress","tag-plugin-wordpress-fr","tag-securite-informatique","tag-vulnerabilites-wordpress","tag-wordpress-fr"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cyberattaque contre WordPress, plugins compromis - Refurbished Computers - ComputerShop.EU<\/title>\n<meta name=\"description\" content=\"Un nouvel incident de s\u00e9curit\u00e9 met en \u00e9vidence les vuln\u00e9rabilit\u00e9s de WordPress, la plateforme populaire de cr\u00e9ation de sites.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/computershop.eu\/blog\/fr\/cyberattaque-contre-wordpress-plugins-compromis\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyberattaque contre WordPress, plugins compromis - Refurbished Computers - ComputerShop.EU\" \/>\n<meta property=\"og:description\" content=\"Un nouvel incident de s\u00e9curit\u00e9 met en \u00e9vidence les vuln\u00e9rabilit\u00e9s de WordPress, la plateforme populaire de cr\u00e9ation de sites.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/computershop.eu\/blog\/fr\/cyberattaque-contre-wordpress-plugins-compromis\" \/>\n<meta property=\"og:site_name\" content=\"Refurbished Computers - ComputerShop.EU\" \/>\n<meta property=\"article:published_time\" content=\"2026-04-16T06:32:50+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-16T06:42:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/computershop.eu\/blog\/wp-content\/uploads\/2026\/04\/wordpress.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1600\" \/>\n\t<meta property=\"og:image:height\" content=\"896\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Alex\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Alex\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/computershop.eu\/blog\/fr\/cyberattaque-contre-wordpress-plugins-compromis#article\",\"isPartOf\":{\"@id\":\"https:\/\/computershop.eu\/blog\/fr\/cyberattaque-contre-wordpress-plugins-compromis\"},\"author\":{\"name\":\"Alex\",\"@id\":\"https:\/\/computershop.eu\/blog\/#\/schema\/person\/0eb808f8e90cce21170267d78190e76a\"},\"headline\":\"Cyberattaque contre WordPress, plugins compromis\",\"datePublished\":\"2026-04-16T06:32:50+00:00\",\"dateModified\":\"2026-04-16T06:42:43+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/computershop.eu\/blog\/fr\/cyberattaque-contre-wordpress-plugins-compromis\"},\"wordCount\":664,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/computershop.eu\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/computershop.eu\/blog\/fr\/cyberattaque-contre-wordpress-plugins-compromis#primaryimage\"},\"thumbnailUrl\":\"https:\/\/computershop.eu\/blog\/wp-content\/uploads\/2026\/04\/wordpress.png\",\"keywords\":[\"cyberattaque\",\"cyberattaque wordpress\",\"plugin wordpress\",\"s\u00e9curit\u00e9 informatique\",\"vuln\u00e9rabilit\u00e9s wordpress\",\"wordpress\"],\"articleSection\":[\"Nouvelles\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/computershop.eu\/blog\/fr\/cyberattaque-contre-wordpress-plugins-compromis#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/computershop.eu\/blog\/fr\/cyberattaque-contre-wordpress-plugins-compromis\",\"url\":\"https:\/\/computershop.eu\/blog\/fr\/cyberattaque-contre-wordpress-plugins-compromis\",\"name\":\"Cyberattaque contre WordPress, plugins compromis - Refurbished Computers - ComputerShop.EU\",\"isPartOf\":{\"@id\":\"https:\/\/computershop.eu\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/computershop.eu\/blog\/fr\/cyberattaque-contre-wordpress-plugins-compromis#primaryimage\"},\"image\":{\"@id\":\"https:\/\/computershop.eu\/blog\/fr\/cyberattaque-contre-wordpress-plugins-compromis#primaryimage\"},\"thumbnailUrl\":\"https:\/\/computershop.eu\/blog\/wp-content\/uploads\/2026\/04\/wordpress.png\",\"datePublished\":\"2026-04-16T06:32:50+00:00\",\"dateModified\":\"2026-04-16T06:42:43+00:00\",\"description\":\"Un nouvel incident de s\u00e9curit\u00e9 met en \u00e9vidence les vuln\u00e9rabilit\u00e9s de WordPress, la plateforme populaire de cr\u00e9ation de sites.\",\"breadcrumb\":{\"@id\":\"https:\/\/computershop.eu\/blog\/fr\/cyberattaque-contre-wordpress-plugins-compromis#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/computershop.eu\/blog\/fr\/cyberattaque-contre-wordpress-plugins-compromis\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/computershop.eu\/blog\/fr\/cyberattaque-contre-wordpress-plugins-compromis#primaryimage\",\"url\":\"https:\/\/computershop.eu\/blog\/wp-content\/uploads\/2026\/04\/wordpress.png\",\"contentUrl\":\"https:\/\/computershop.eu\/blog\/wp-content\/uploads\/2026\/04\/wordpress.png\",\"width\":1600,\"height\":896,\"caption\":\"wordpress\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/computershop.eu\/blog\/fr\/cyberattaque-contre-wordpress-plugins-compromis#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/computershop.eu\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyberattaque contre WordPress, plugins compromis\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/computershop.eu\/blog\/#website\",\"url\":\"https:\/\/computershop.eu\/blog\/\",\"name\":\"Refurbished Computers - ComputerShop.EU\",\"description\":\"Best Refurbished Computers In The EU\",\"publisher\":{\"@id\":\"https:\/\/computershop.eu\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/computershop.eu\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/computershop.eu\/blog\/#organization\",\"name\":\"Refurbished Computers - ComputerShop.EU\",\"url\":\"https:\/\/computershop.eu\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/computershop.eu\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/computershop.eu\/blog\/wp-content\/uploads\/2025\/08\/logo-inverse-footer.png\",\"contentUrl\":\"https:\/\/computershop.eu\/blog\/wp-content\/uploads\/2025\/08\/logo-inverse-footer.png\",\"width\":300,\"height\":54,\"caption\":\"Refurbished Computers - ComputerShop.EU\"},\"image\":{\"@id\":\"https:\/\/computershop.eu\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/computershop.eu\/blog\/#\/schema\/person\/0eb808f8e90cce21170267d78190e76a\",\"name\":\"Alex\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/computershop.eu\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/ac40376cb3b388c90452c10b7c3a589e9c469d972bfc92df578a42f1a1e7fc7f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/ac40376cb3b388c90452c10b7c3a589e9c469d972bfc92df578a42f1a1e7fc7f?s=96&d=mm&r=g\",\"caption\":\"Alex\"},\"url\":\"https:\/\/computershop.eu\/blog\/author\/alex\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyberattaque contre WordPress, plugins compromis - Refurbished Computers - ComputerShop.EU","description":"Un nouvel incident de s\u00e9curit\u00e9 met en \u00e9vidence les vuln\u00e9rabilit\u00e9s de WordPress, la plateforme populaire de cr\u00e9ation de sites.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/computershop.eu\/blog\/fr\/cyberattaque-contre-wordpress-plugins-compromis","og_locale":"en_US","og_type":"article","og_title":"Cyberattaque contre WordPress, plugins compromis - Refurbished Computers - ComputerShop.EU","og_description":"Un nouvel incident de s\u00e9curit\u00e9 met en \u00e9vidence les vuln\u00e9rabilit\u00e9s de WordPress, la plateforme populaire de cr\u00e9ation de sites.","og_url":"https:\/\/computershop.eu\/blog\/fr\/cyberattaque-contre-wordpress-plugins-compromis","og_site_name":"Refurbished Computers - ComputerShop.EU","article_published_time":"2026-04-16T06:32:50+00:00","article_modified_time":"2026-04-16T06:42:43+00:00","og_image":[{"width":1600,"height":896,"url":"https:\/\/computershop.eu\/blog\/wp-content\/uploads\/2026\/04\/wordpress.png","type":"image\/png"}],"author":"Alex","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Alex","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/computershop.eu\/blog\/fr\/cyberattaque-contre-wordpress-plugins-compromis#article","isPartOf":{"@id":"https:\/\/computershop.eu\/blog\/fr\/cyberattaque-contre-wordpress-plugins-compromis"},"author":{"name":"Alex","@id":"https:\/\/computershop.eu\/blog\/#\/schema\/person\/0eb808f8e90cce21170267d78190e76a"},"headline":"Cyberattaque contre WordPress, plugins compromis","datePublished":"2026-04-16T06:32:50+00:00","dateModified":"2026-04-16T06:42:43+00:00","mainEntityOfPage":{"@id":"https:\/\/computershop.eu\/blog\/fr\/cyberattaque-contre-wordpress-plugins-compromis"},"wordCount":664,"commentCount":0,"publisher":{"@id":"https:\/\/computershop.eu\/blog\/#organization"},"image":{"@id":"https:\/\/computershop.eu\/blog\/fr\/cyberattaque-contre-wordpress-plugins-compromis#primaryimage"},"thumbnailUrl":"https:\/\/computershop.eu\/blog\/wp-content\/uploads\/2026\/04\/wordpress.png","keywords":["cyberattaque","cyberattaque wordpress","plugin wordpress","s\u00e9curit\u00e9 informatique","vuln\u00e9rabilit\u00e9s wordpress","wordpress"],"articleSection":["Nouvelles"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/computershop.eu\/blog\/fr\/cyberattaque-contre-wordpress-plugins-compromis#respond"]}]},{"@type":"WebPage","@id":"https:\/\/computershop.eu\/blog\/fr\/cyberattaque-contre-wordpress-plugins-compromis","url":"https:\/\/computershop.eu\/blog\/fr\/cyberattaque-contre-wordpress-plugins-compromis","name":"Cyberattaque contre WordPress, plugins compromis - Refurbished Computers - ComputerShop.EU","isPartOf":{"@id":"https:\/\/computershop.eu\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/computershop.eu\/blog\/fr\/cyberattaque-contre-wordpress-plugins-compromis#primaryimage"},"image":{"@id":"https:\/\/computershop.eu\/blog\/fr\/cyberattaque-contre-wordpress-plugins-compromis#primaryimage"},"thumbnailUrl":"https:\/\/computershop.eu\/blog\/wp-content\/uploads\/2026\/04\/wordpress.png","datePublished":"2026-04-16T06:32:50+00:00","dateModified":"2026-04-16T06:42:43+00:00","description":"Un nouvel incident de s\u00e9curit\u00e9 met en \u00e9vidence les vuln\u00e9rabilit\u00e9s de WordPress, la plateforme populaire de cr\u00e9ation de sites.","breadcrumb":{"@id":"https:\/\/computershop.eu\/blog\/fr\/cyberattaque-contre-wordpress-plugins-compromis#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/computershop.eu\/blog\/fr\/cyberattaque-contre-wordpress-plugins-compromis"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/computershop.eu\/blog\/fr\/cyberattaque-contre-wordpress-plugins-compromis#primaryimage","url":"https:\/\/computershop.eu\/blog\/wp-content\/uploads\/2026\/04\/wordpress.png","contentUrl":"https:\/\/computershop.eu\/blog\/wp-content\/uploads\/2026\/04\/wordpress.png","width":1600,"height":896,"caption":"wordpress"},{"@type":"BreadcrumbList","@id":"https:\/\/computershop.eu\/blog\/fr\/cyberattaque-contre-wordpress-plugins-compromis#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/computershop.eu\/blog\/"},{"@type":"ListItem","position":2,"name":"Cyberattaque contre WordPress, plugins compromis"}]},{"@type":"WebSite","@id":"https:\/\/computershop.eu\/blog\/#website","url":"https:\/\/computershop.eu\/blog\/","name":"Refurbished Computers - ComputerShop.EU","description":"Best Refurbished Computers In The EU","publisher":{"@id":"https:\/\/computershop.eu\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/computershop.eu\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/computershop.eu\/blog\/#organization","name":"Refurbished Computers - ComputerShop.EU","url":"https:\/\/computershop.eu\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/computershop.eu\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/computershop.eu\/blog\/wp-content\/uploads\/2025\/08\/logo-inverse-footer.png","contentUrl":"https:\/\/computershop.eu\/blog\/wp-content\/uploads\/2025\/08\/logo-inverse-footer.png","width":300,"height":54,"caption":"Refurbished Computers - ComputerShop.EU"},"image":{"@id":"https:\/\/computershop.eu\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/computershop.eu\/blog\/#\/schema\/person\/0eb808f8e90cce21170267d78190e76a","name":"Alex","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/computershop.eu\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/ac40376cb3b388c90452c10b7c3a589e9c469d972bfc92df578a42f1a1e7fc7f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ac40376cb3b388c90452c10b7c3a589e9c469d972bfc92df578a42f1a1e7fc7f?s=96&d=mm&r=g","caption":"Alex"},"url":"https:\/\/computershop.eu\/blog\/author\/alex"}]}},"jetpack_featured_media_url":"https:\/\/computershop.eu\/blog\/wp-content\/uploads\/2026\/04\/wordpress.png","jetpack_sharing_enabled":true,"jetpack-related-posts":[],"_links":{"self":[{"href":"https:\/\/computershop.eu\/blog\/wp-json\/wp\/v2\/posts\/4092","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/computershop.eu\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/computershop.eu\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/computershop.eu\/blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/computershop.eu\/blog\/wp-json\/wp\/v2\/comments?post=4092"}],"version-history":[{"count":1,"href":"https:\/\/computershop.eu\/blog\/wp-json\/wp\/v2\/posts\/4092\/revisions"}],"predecessor-version":[{"id":4102,"href":"https:\/\/computershop.eu\/blog\/wp-json\/wp\/v2\/posts\/4092\/revisions\/4102"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/computershop.eu\/blog\/wp-json\/wp\/v2\/media\/4087"}],"wp:attachment":[{"href":"https:\/\/computershop.eu\/blog\/wp-json\/wp\/v2\/media?parent=4092"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/computershop.eu\/blog\/wp-json\/wp\/v2\/categories?post=4092"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/computershop.eu\/blog\/wp-json\/wp\/v2\/tags?post=4092"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}