{"id":4094,"date":"2026-04-16T08:32:50","date_gmt":"2026-04-16T06:32:50","guid":{"rendered":"https:\/\/computershop.eu\/blog\/?p=4081"},"modified":"2026-04-16T08:38:26","modified_gmt":"2026-04-16T06:38:26","slug":"cyber-attack-on-wordpress-compromised-plugins","status":"publish","type":"post","link":"https:\/\/computershop.eu\/blog\/cyber-attack-on-wordpress-compromised-plugins","title":{"rendered":"Cyber attack on WordPress, compromised plugins"},"content":{"rendered":"<span class=\"span-reading-time rt-reading-time\" style=\"display: block;\"><span class=\"rt-label rt-prefix\">Reading Time: <\/span> <span class=\"rt-time\"> 2<\/span> <span class=\"rt-label rt-postfix\">minutes<\/span><\/span>\n<p>A new security incident highlights the vulnerabilities of the WordPress ecosystem, one of the most popular website creation platforms in the world. Dozens of plugins used by thousands of websites have been withdrawn after the discovery of a dangerous backdoor, used to inject malicious code.<\/p>\n\n\n\n<p>WordPress continues to be a major target for sophisticated cyberattacks. Following recent incidents where popular plugins were compromised and used to distribute malicious code, new research shows an even more dangerous trend: <strong>hidden backdoors that create administrator accounts without users&#8217; knowledge<\/strong>.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Attacks via plugins: a major vulnerability<\/h3>\n\n\n\n<p>The case of compromised plugins (such as Essential Plugin) highlights a method called <em>supply chain attack<\/em>. Attackers buy or compromise legitimate software and introduce malicious code into seemingly secure updates. This code can remain dormant, then activate to infect thousands of sites simultaneously.<\/p>\n\n\n\n<p>WordPress plugins have extensive system access, which makes them extremely attractive to hackers. In addition, users are not warned when a plugin changes ownership, which increases the risk of compromise.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Hidden backdoors: the invisible threat<\/h3>\n\n\n\n<p>According to an analysis published by <a href=\"https:\/\/www.bitdefender.com\/en-us\/blog\/hotforsecurity\/hidden-wordpress-backdoors-admin-accounts\" target=\"_blank\" rel=\"noreferrer noopener\">Bitdefender<\/a>, attackers are using increasingly sophisticated techniques to maintain long-term access to WordPress sites.<\/p>\n\n\n\n<p>An example is the fake plugin \u201cDebugMaster Pro,\u201d which presents itself as a legitimate tool, but in reality:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>creates <strong>hidden administrator accounts<\/strong> with predefined data<\/li>\n\n\n\n<li>transmits sensitive information to servers controlled by attackers<\/li>\n\n\n\n<li>hides itself from the plugin list to avoid detection.<\/li>\n<\/ul>\n\n\n\n<p>Moreover, other malicious files can automatically recreate admin accounts even if they are deleted by the site administrator.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Why are these attacks so dangerous?<\/h3>\n\n\n\n<p>Once an attacker obtains administrator access, they can:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>completely modify the site&#8217;s content<\/li>\n\n\n\n<li>inject malware or spam ads<\/li>\n\n\n\n<li>steal user data<\/li>\n\n\n\n<li>redirect visitors to dangerous pages.<\/li>\n<\/ul>\n\n\n\n<p>In some cases, compromised sites may continue to function seemingly normally, while running <a href=\"https:\/\/computershop.eu\/blog\/the-popular-applications-hwmonitor-and-cpu-z-infected-with-malware\" target=\"_blank\" rel=\"noreferrer noopener\">malicious code<\/a> in the background, which makes detection extremely difficult.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Signs that your WordPress site is compromised<\/h3>\n\n\n\n<p>It is important to pay attention to clues such as:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>the appearance of unknown admin accounts<\/li>\n\n\n\n<li>suspicious plugins or files<\/li>\n\n\n\n<li>strange redirects or modified content<\/li>\n\n\n\n<li>low performance or unusual traffic.<\/li>\n<\/ul>\n\n\n\n<p>Experts emphasize that these backdoors are specifically designed to remain undetected and to persist even after partial site cleanups.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">How to protect your WordPress site<\/h3>\n\n\n\n<p>To reduce risks, follow these good SEO and security practices:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Only install plugins from trusted sources<\/li>\n\n\n\n<li>Periodically check user accounts<\/li>\n\n\n\n<li>Constantly update WordPress and extensions<\/li>\n\n\n\n<li>Use dedicated security solutions<\/li>\n\n\n\n<li>Perform regular backups.<\/li>\n<\/ol>\n\n\n\n<p>Recent attacks demonstrate that WordPress security should not be treated lightly. From compromised plugins to invisible backdoors that create admin accounts, threats are becoming increasingly complex.<\/p>\n\n\n\n<p>If you own a WordPress site, it is essential to be proactive: monitor, update, and secure constantly. In today&#8217;s digital environment, prevention is no longer optional, but a necessity.<\/p>\n\n\n\n<p>Source: <a href=\"https:\/\/anchor.host\/someone-bought-30-wordpress-plugins-and-planted-a-backdoor-in-all-of-them\/\" target=\"_blank\" rel=\"noreferrer noopener\">anchor.host<\/a>, <a href=\"https:\/\/www.bitdefender.com\/en-us\/blog\/hotforsecurity\/hidden-wordpress-backdoors-admin-accounts\" target=\"_blank\" rel=\"noreferrer noopener\">bitdefender.com<\/a><\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><a href=\"https:\/\/computershop.eu\/computers-1\/all-in-one-computers\" target=\"_blank\" rel=\" noreferrer noopener\"><img loading=\"lazy\" decoding=\"async\" width=\"940\" height=\"788\" src=\"https:\/\/computershop.eu\/blog\/wp-content\/uploads\/2026\/04\/All-In-One-PC.png\" alt=\"All-In-One PC\" class=\"wp-image-4088\" style=\"aspect-ratio:1.1876926796832497;width:399px;height:auto\" srcset=\"https:\/\/computershop.eu\/blog\/wp-content\/uploads\/2026\/04\/All-In-One-PC.png 940w, https:\/\/computershop.eu\/blog\/wp-content\/uploads\/2026\/04\/All-In-One-PC-300x251.png 300w, https:\/\/computershop.eu\/blog\/wp-content\/uploads\/2026\/04\/All-In-One-PC-768x644.png 768w, https:\/\/computershop.eu\/blog\/wp-content\/uploads\/2026\/04\/All-In-One-PC-358x300.png 358w\" sizes=\"auto, (max-width: 940px) 100vw, 940px\" \/><\/a><\/figure>\n<\/div>\t<div class=\"quickshare-container\">\r\n\t<ul class=\"quickshare-genericons monochrome quickshare-effect-expand\">\r\n\t\t<li class=\"quickshare-share\">Share:<\/li> \r\n\t\t<li><a href=\"https:\/\/facebook.com\/sharer.php?u=https%3A%2F%2Fcomputershop.eu%2Fblog%2Fcyber-attack-on-wordpress-compromised-plugins&amp;t=Cyber+attack+on+WordPress%2C+compromised+plugins+<+Refurbished+Computers+-+ComputerShop.EU\" target=\"_blank\" title=\"Share on Facebook\"><span class=\"quickshare-facebook\">Facebook<\/span><\/a><\/li>\t\t<li><a href=\"https:\/\/twitter.com\/intent\/tweet?url=https%3A%2F%2Fcomputershop.eu%2Fblog%2Fcyber-attack-on-wordpress-compromised-plugins&amp;text=Cyber+attack+on+WordPress%2C+compromised+plugins+<+Refurbished+Computers+-+ComputerShop.EU\" target=\"_blank\" title=\"Share on Twitter\"><span class=\"quickshare-twitter\">Twitter<\/span><\/a><\/li>\t\t<li><a href=\"http:\/\/pinterest.com\/pin\/create\/button\/?url=https%3A%2F%2Fcomputershop.eu%2Fblog%2Fcyber-attack-on-wordpress-compromised-plugins&amp;media=https%3A%2F%2Fcomputershop.eu%2Fblog%2Fwp-content%2Fuploads%2F2026%2F04%2Fwordpress-300x168.png&amp;description=A+new+security+incident+highlights+the+vulnerabilities+of+the+WordPress+ecosystem%2C+one+of+the+most+popular+website+creation+platforms+in+the+world.+Dozens+of+plugins+used+by+thousands+of+websites+have+been+withdrawn+after+the+discovery+of+a+dangerous+backdoor%2C%26hellip%3B\" target=\"_blank\" title=\"Share on Pinterest\"><span class=\"quickshare-pinterest\">Pinterest<\/span><\/a><\/li>\t\t<li><a href=\"http:\/\/linkedin.com\/shareArticle?mini=true&amp;url=https%3A%2F%2Fcomputershop.eu%2Fblog%2Fcyber-attack-on-wordpress-compromised-plugins&amp;title=Cyber+attack+on+WordPress%2C+compromised+plugins&amp;source=Refurbished+Computers+-+ComputerShop.EU&amp;summary=A+new+security+incident+highlights+the+vulnerabilities+of+the+WordPress+ecosystem%2C+one+of+the+most+popular+website+creation+platforms+in+the+world.+Dozens+of+plugins+used+by+thousands+of+websites+have+been+withdrawn+after+the+discovery+of+a+dangerous+backdoor%2C%26hellip%3B\" title=\"Share on Linkedin\" target=\"_blank\"><span class=\"quickshare-linkedin\">Linkedin<\/span><\/a><\/li>\t\t<li><a href=\"https:\/\/plus.google.com\/share?url=https%3A%2F%2Fcomputershop.eu%2Fblog%2Fcyber-attack-on-wordpress-compromised-plugins\" target=\"_blank\" title=\"Share on Google+\"><span class=\"quickshare-googleplus\">Google+<\/span><\/a><\/li>\t\t\t\t\t\t\t\t<li><a href=\"mailto:?subject=Refurbished+Computers+-+ComputerShop.EU:+Cyber+attack+on+WordPress%2C+compromised+plugins&amp;body=https%3A%2F%2Fcomputershop.eu%2Fblog%2Fcyber-attack-on-wordpress-compromised-plugins\" target=\"_blank\" title=\"Share via Email\"><span class=\"quickshare-email\">Email<\/span><\/a><\/li>\t<\/ul>\r\n\t<\/div>\r\n","protected":false},"excerpt":{"rendered":"<p><span class=\"span-reading-time rt-reading-time\" style=\"display: block;\"><span class=\"rt-label rt-prefix\">Reading Time: <\/span> <span class=\"rt-time\"> 2<\/span> <span class=\"rt-label rt-postfix\">minutes<\/span><\/span>A new security incident highlights the vulnerabilities of the WordPress ecosystem, one of the most popular website creation platforms in the world. Dozens of plugins used by thousands of websites have been withdrawn after the discovery of a dangerous backdoor, &hellip; <a href=\"https:\/\/computershop.eu\/blog\/cyber-attack-on-wordpress-compromised-plugins\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":4,"featured_media":4087,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[101],"tags":[15264,9887,15266,7071,15268,15270],"class_list":["post-4094","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","tag-ataque-cibernetico-wordpress-en","tag-cyber-attack","tag-plugin-wordpress-en","tag-securitate-cibernetica","tag-vulnerabilidades-wordpress-en","tag-wordpress-en"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cyber attack on WordPress, compromised plugins - Refurbished Computers - ComputerShop.EU<\/title>\n<meta name=\"description\" content=\"A new security incident highlights the vulnerabilities of WordPress, the popular website creation platform.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/computershop.eu\/blog\/cyber-attack-on-wordpress-compromised-plugins\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber attack on WordPress, compromised plugins - Refurbished Computers - ComputerShop.EU\" \/>\n<meta property=\"og:description\" content=\"A new security incident highlights the vulnerabilities of WordPress, the popular website creation platform.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/computershop.eu\/blog\/cyber-attack-on-wordpress-compromised-plugins\" \/>\n<meta property=\"og:site_name\" content=\"Refurbished Computers - ComputerShop.EU\" \/>\n<meta property=\"article:published_time\" content=\"2026-04-16T06:32:50+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-16T06:38:26+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/computershop.eu\/blog\/wp-content\/uploads\/2026\/04\/wordpress.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1600\" \/>\n\t<meta property=\"og:image:height\" content=\"896\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Alex\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Alex\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/computershop.eu\/blog\/cyber-attack-on-wordpress-compromised-plugins#article\",\"isPartOf\":{\"@id\":\"https:\/\/computershop.eu\/blog\/cyber-attack-on-wordpress-compromised-plugins\"},\"author\":{\"name\":\"Alex\",\"@id\":\"https:\/\/computershop.eu\/blog\/#\/schema\/person\/0eb808f8e90cce21170267d78190e76a\"},\"headline\":\"Cyber attack on WordPress, compromised plugins\",\"datePublished\":\"2026-04-16T06:32:50+00:00\",\"dateModified\":\"2026-04-16T06:38:26+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/computershop.eu\/blog\/cyber-attack-on-wordpress-compromised-plugins\"},\"wordCount\":467,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/computershop.eu\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/computershop.eu\/blog\/cyber-attack-on-wordpress-compromised-plugins#primaryimage\"},\"thumbnailUrl\":\"https:\/\/computershop.eu\/blog\/wp-content\/uploads\/2026\/04\/wordpress.png\",\"keywords\":[\"ataque cibern\u00e9tico wordpress\",\"cyber attack\",\"plugin wordpress\",\"securitate cibernetic\u0103\",\"vulnerabilidades wordpress\",\"wordpress\"],\"articleSection\":[\"News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/computershop.eu\/blog\/cyber-attack-on-wordpress-compromised-plugins#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/computershop.eu\/blog\/cyber-attack-on-wordpress-compromised-plugins\",\"url\":\"https:\/\/computershop.eu\/blog\/cyber-attack-on-wordpress-compromised-plugins\",\"name\":\"Cyber attack on WordPress, compromised plugins - Refurbished Computers - ComputerShop.EU\",\"isPartOf\":{\"@id\":\"https:\/\/computershop.eu\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/computershop.eu\/blog\/cyber-attack-on-wordpress-compromised-plugins#primaryimage\"},\"image\":{\"@id\":\"https:\/\/computershop.eu\/blog\/cyber-attack-on-wordpress-compromised-plugins#primaryimage\"},\"thumbnailUrl\":\"https:\/\/computershop.eu\/blog\/wp-content\/uploads\/2026\/04\/wordpress.png\",\"datePublished\":\"2026-04-16T06:32:50+00:00\",\"dateModified\":\"2026-04-16T06:38:26+00:00\",\"description\":\"A new security incident highlights the vulnerabilities of WordPress, the popular website creation platform.\",\"breadcrumb\":{\"@id\":\"https:\/\/computershop.eu\/blog\/cyber-attack-on-wordpress-compromised-plugins#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/computershop.eu\/blog\/cyber-attack-on-wordpress-compromised-plugins\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/computershop.eu\/blog\/cyber-attack-on-wordpress-compromised-plugins#primaryimage\",\"url\":\"https:\/\/computershop.eu\/blog\/wp-content\/uploads\/2026\/04\/wordpress.png\",\"contentUrl\":\"https:\/\/computershop.eu\/blog\/wp-content\/uploads\/2026\/04\/wordpress.png\",\"width\":1600,\"height\":896,\"caption\":\"wordpress\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/computershop.eu\/blog\/cyber-attack-on-wordpress-compromised-plugins#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/computershop.eu\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber attack on WordPress, compromised plugins\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/computershop.eu\/blog\/#website\",\"url\":\"https:\/\/computershop.eu\/blog\/\",\"name\":\"Refurbished Computers - ComputerShop.EU\",\"description\":\"Best Refurbished Computers In The EU\",\"publisher\":{\"@id\":\"https:\/\/computershop.eu\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/computershop.eu\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/computershop.eu\/blog\/#organization\",\"name\":\"Refurbished Computers - ComputerShop.EU\",\"url\":\"https:\/\/computershop.eu\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/computershop.eu\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/computershop.eu\/blog\/wp-content\/uploads\/2025\/08\/logo-inverse-footer.png\",\"contentUrl\":\"https:\/\/computershop.eu\/blog\/wp-content\/uploads\/2025\/08\/logo-inverse-footer.png\",\"width\":300,\"height\":54,\"caption\":\"Refurbished Computers - ComputerShop.EU\"},\"image\":{\"@id\":\"https:\/\/computershop.eu\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/computershop.eu\/blog\/#\/schema\/person\/0eb808f8e90cce21170267d78190e76a\",\"name\":\"Alex\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/computershop.eu\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/ac40376cb3b388c90452c10b7c3a589e9c469d972bfc92df578a42f1a1e7fc7f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/ac40376cb3b388c90452c10b7c3a589e9c469d972bfc92df578a42f1a1e7fc7f?s=96&d=mm&r=g\",\"caption\":\"Alex\"},\"url\":\"https:\/\/computershop.eu\/blog\/author\/alex\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber attack on WordPress, compromised plugins - Refurbished Computers - ComputerShop.EU","description":"A new security incident highlights the vulnerabilities of WordPress, the popular website creation platform.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/computershop.eu\/blog\/cyber-attack-on-wordpress-compromised-plugins","og_locale":"en_US","og_type":"article","og_title":"Cyber attack on WordPress, compromised plugins - Refurbished Computers - ComputerShop.EU","og_description":"A new security incident highlights the vulnerabilities of WordPress, the popular website creation platform.","og_url":"https:\/\/computershop.eu\/blog\/cyber-attack-on-wordpress-compromised-plugins","og_site_name":"Refurbished Computers - ComputerShop.EU","article_published_time":"2026-04-16T06:32:50+00:00","article_modified_time":"2026-04-16T06:38:26+00:00","og_image":[{"width":1600,"height":896,"url":"https:\/\/computershop.eu\/blog\/wp-content\/uploads\/2026\/04\/wordpress.png","type":"image\/png"}],"author":"Alex","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Alex","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/computershop.eu\/blog\/cyber-attack-on-wordpress-compromised-plugins#article","isPartOf":{"@id":"https:\/\/computershop.eu\/blog\/cyber-attack-on-wordpress-compromised-plugins"},"author":{"name":"Alex","@id":"https:\/\/computershop.eu\/blog\/#\/schema\/person\/0eb808f8e90cce21170267d78190e76a"},"headline":"Cyber attack on WordPress, compromised plugins","datePublished":"2026-04-16T06:32:50+00:00","dateModified":"2026-04-16T06:38:26+00:00","mainEntityOfPage":{"@id":"https:\/\/computershop.eu\/blog\/cyber-attack-on-wordpress-compromised-plugins"},"wordCount":467,"commentCount":0,"publisher":{"@id":"https:\/\/computershop.eu\/blog\/#organization"},"image":{"@id":"https:\/\/computershop.eu\/blog\/cyber-attack-on-wordpress-compromised-plugins#primaryimage"},"thumbnailUrl":"https:\/\/computershop.eu\/blog\/wp-content\/uploads\/2026\/04\/wordpress.png","keywords":["ataque cibern\u00e9tico wordpress","cyber attack","plugin wordpress","securitate cibernetic\u0103","vulnerabilidades wordpress","wordpress"],"articleSection":["News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/computershop.eu\/blog\/cyber-attack-on-wordpress-compromised-plugins#respond"]}]},{"@type":"WebPage","@id":"https:\/\/computershop.eu\/blog\/cyber-attack-on-wordpress-compromised-plugins","url":"https:\/\/computershop.eu\/blog\/cyber-attack-on-wordpress-compromised-plugins","name":"Cyber attack on WordPress, compromised plugins - Refurbished Computers - ComputerShop.EU","isPartOf":{"@id":"https:\/\/computershop.eu\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/computershop.eu\/blog\/cyber-attack-on-wordpress-compromised-plugins#primaryimage"},"image":{"@id":"https:\/\/computershop.eu\/blog\/cyber-attack-on-wordpress-compromised-plugins#primaryimage"},"thumbnailUrl":"https:\/\/computershop.eu\/blog\/wp-content\/uploads\/2026\/04\/wordpress.png","datePublished":"2026-04-16T06:32:50+00:00","dateModified":"2026-04-16T06:38:26+00:00","description":"A new security incident highlights the vulnerabilities of WordPress, the popular website creation platform.","breadcrumb":{"@id":"https:\/\/computershop.eu\/blog\/cyber-attack-on-wordpress-compromised-plugins#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/computershop.eu\/blog\/cyber-attack-on-wordpress-compromised-plugins"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/computershop.eu\/blog\/cyber-attack-on-wordpress-compromised-plugins#primaryimage","url":"https:\/\/computershop.eu\/blog\/wp-content\/uploads\/2026\/04\/wordpress.png","contentUrl":"https:\/\/computershop.eu\/blog\/wp-content\/uploads\/2026\/04\/wordpress.png","width":1600,"height":896,"caption":"wordpress"},{"@type":"BreadcrumbList","@id":"https:\/\/computershop.eu\/blog\/cyber-attack-on-wordpress-compromised-plugins#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/computershop.eu\/blog\/"},{"@type":"ListItem","position":2,"name":"Cyber attack on WordPress, compromised plugins"}]},{"@type":"WebSite","@id":"https:\/\/computershop.eu\/blog\/#website","url":"https:\/\/computershop.eu\/blog\/","name":"Refurbished Computers - ComputerShop.EU","description":"Best Refurbished Computers In The EU","publisher":{"@id":"https:\/\/computershop.eu\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/computershop.eu\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/computershop.eu\/blog\/#organization","name":"Refurbished Computers - ComputerShop.EU","url":"https:\/\/computershop.eu\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/computershop.eu\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/computershop.eu\/blog\/wp-content\/uploads\/2025\/08\/logo-inverse-footer.png","contentUrl":"https:\/\/computershop.eu\/blog\/wp-content\/uploads\/2025\/08\/logo-inverse-footer.png","width":300,"height":54,"caption":"Refurbished Computers - ComputerShop.EU"},"image":{"@id":"https:\/\/computershop.eu\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/computershop.eu\/blog\/#\/schema\/person\/0eb808f8e90cce21170267d78190e76a","name":"Alex","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/computershop.eu\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/ac40376cb3b388c90452c10b7c3a589e9c469d972bfc92df578a42f1a1e7fc7f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ac40376cb3b388c90452c10b7c3a589e9c469d972bfc92df578a42f1a1e7fc7f?s=96&d=mm&r=g","caption":"Alex"},"url":"https:\/\/computershop.eu\/blog\/author\/alex"}]}},"jetpack_featured_media_url":"https:\/\/computershop.eu\/blog\/wp-content\/uploads\/2026\/04\/wordpress.png","jetpack_sharing_enabled":true,"jetpack-related-posts":[],"_links":{"self":[{"href":"https:\/\/computershop.eu\/blog\/wp-json\/wp\/v2\/posts\/4094","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/computershop.eu\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/computershop.eu\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/computershop.eu\/blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/computershop.eu\/blog\/wp-json\/wp\/v2\/comments?post=4094"}],"version-history":[{"count":1,"href":"https:\/\/computershop.eu\/blog\/wp-json\/wp\/v2\/posts\/4094\/revisions"}],"predecessor-version":[{"id":4097,"href":"https:\/\/computershop.eu\/blog\/wp-json\/wp\/v2\/posts\/4094\/revisions\/4097"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/computershop.eu\/blog\/wp-json\/wp\/v2\/media\/4087"}],"wp:attachment":[{"href":"https:\/\/computershop.eu\/blog\/wp-json\/wp\/v2\/media?parent=4094"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/computershop.eu\/blog\/wp-json\/wp\/v2\/categories?post=4094"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/computershop.eu\/blog\/wp-json\/wp\/v2\/tags?post=4094"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}