{"id":4096,"date":"2026-04-16T08:32:50","date_gmt":"2026-04-16T06:32:50","guid":{"rendered":"https:\/\/computershop.eu\/blog\/?p=4081"},"modified":"2026-04-16T08:39:53","modified_gmt":"2026-04-16T06:39:53","slug":"attacco-informatico-su-wordpress-plugin-compromessi","status":"publish","type":"post","link":"https:\/\/computershop.eu\/blog\/it\/attacco-informatico-su-wordpress-plugin-compromessi","title":{"rendered":"Attacco informatico su WordPress, plugin compromessi"},"content":{"rendered":"<span class=\"span-reading-time rt-reading-time\" style=\"display: block;\"><span class=\"rt-label rt-prefix\">Reading Time: <\/span> <span class=\"rt-time\"> 2<\/span> <span class=\"rt-label rt-postfix\">minutes<\/span><\/span>\n<p>Un nuovo incidente di sicurezza mette in evidenza le vulnerabilit\u00e0 dell&#8217;ecosistema WordPress, una delle piattaforme di creazione di siti web pi\u00f9 popolari al mondo. Decine di plugin utilizzati da migliaia di siti web sono stati ritirati dopo la scoperta di un pericoloso backdoor, utilizzato per iniettare codice malevolo.<\/p>\n\n\n\n<p>WordPress continua a essere un obiettivo principale per attacchi informatici sofisticati. Dopo i recenti incidenti in cui plugin popolari sono stati compromessi e utilizzati per la distribuzione di&nbsp;codice malevolo, nuove ricerche mostrano una tendenza ancora pi\u00f9 pericolosa:&nbsp;<strong>backdoor nascosti che creano account di amministratore senza la conoscenza degli utenti<\/strong>.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Attacchi tramite plugin: una vulnerabilit\u00e0 importante<\/h3>\n\n\n\n<p>Il caso dei plugin compromessi (come Essential Plugin) evidenzia un metodo chiamato&nbsp;<em>supply chain attack<\/em>. Gli attaccanti acquistano o compromettono software legittimo e introducono codice malevolo in aggiornamenti apparentemente sicuri. Questo codice pu\u00f2 rimanere latente, per poi attivarsi per infettare migliaia di siti contemporaneamente.<\/p>\n\n\n\n<p>I plugin di WordPress hanno accesso esteso al sistema, il che li rende estremamente attraenti per gli hacker. Inoltre, gli utenti non vengono avvertiti quando un plugin cambia proprietario, aumentando il rischio di compromissione.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Backdoor nascosti: la minaccia invisibile<\/h3>\n\n\n\n<p>Secondo un&#8217;analisi pubblicata da&nbsp;<a href=\"https:\/\/www.bitdefender.com\/en-us\/blog\/hotforsecurity\/hidden-wordpress-backdoors-admin-accounts\" target=\"_blank\" rel=\"noreferrer noopener\">Bitdefender<\/a>, gli attaccanti utilizzano tecniche sempre pi\u00f9 sofisticate per mantenere l&#8217;accesso a lungo termine ai siti WordPress.<\/p>\n\n\n\n<p>Un esempio \u00e8 il plugin falso \u201cDebugMaster Pro\u201d, che si presenta come uno strumento legittimo, ma in realt\u00e0:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>crea&nbsp;<strong>account di amministratore nascosti<\/strong>&nbsp;con dati predefiniti<\/li>\n\n\n\n<li>trasmette informazioni sensibili a server controllati dagli attaccanti<\/li>\n\n\n\n<li>si nasconde dalla lista dei plugin per evitare il rilevamento.<\/li>\n<\/ul>\n\n\n\n<p>Inoltre, altri file malevoli possono ricreare automaticamente gli account admin anche se vengono eliminati dall&#8217;amministratore del sito.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Perch\u00e9 questi attacchi sono cos\u00ec pericolosi?<\/h3>\n\n\n\n<p>Una volta che un attaccante ottiene l&#8217;accesso da amministratore, pu\u00f2:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>modificare completamente il contenuto del sito<\/li>\n\n\n\n<li>iniettare malware o pubblicit\u00e0 spam<\/li>\n\n\n\n<li>rubare i dati degli utenti<\/li>\n\n\n\n<li>reindirizzare i visitatori a pagine pericolose.<\/li>\n<\/ul>\n\n\n\n<p>In alcuni casi, i siti compromessi possono continuare a funzionare apparentemente normalmente, mentre eseguono <a href=\"https:\/\/computershop.eu\/blog\/it\/le-popolari-applicazioni-hwmonitor-e-cpu-z-infettate-da-malware\" target=\"_blank\" rel=\"noreferrer noopener\">codice malevolo<\/a> in background, il che rende la rilevazione estremamente difficile.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Segnali che il tuo sito WordPress \u00e8 compromesso<\/h3>\n\n\n\n<p>\u00c8 importante prestare attenzione a indizi come:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>apparizione di account admin sconosciuti<\/li>\n\n\n\n<li>plugin o file sospetti<\/li>\n\n\n\n<li>reindirizzamenti strani o contenuto modificato<\/li>\n\n\n\n<li>prestazioni scarse o traffico insolito.<\/li>\n<\/ul>\n\n\n\n<p>Gli esperti sottolineano che questi backdoor sono progettati specificamente per rimanere non rilevati e per persistere anche dopo pulizie parziali del sito.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Come proteggere il tuo sito WordPress<\/h3>\n\n\n\n<p>Per ridurre i rischi, segui queste buone pratiche SEO e di sicurezza:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Installa solo plugin da fonti affidabili<\/li>\n\n\n\n<li>Controlla periodicamente gli account degli utenti<\/li>\n\n\n\n<li>Aggiorna costantemente WordPress e le estensioni<\/li>\n\n\n\n<li>Usa soluzioni di sicurezza dedicate<\/li>\n\n\n\n<li>Esegui backup regolari.<\/li>\n<\/ol>\n\n\n\n<p>Gli attacchi recenti dimostrano che la sicurezza di WordPress non deve essere trattata superficialmente. Dai plugin compromessi ai backdoor invisibili che creano account admin, le minacce diventano sempre pi\u00f9 complesse.<\/p>\n\n\n\n<p>Se possiedi un sito WordPress, \u00e8 essenziale essere proattivi: monitora, aggiorna e sicurizza costantemente. Nell&#8217;attuale ambiente digitale, la prevenzione non \u00e8 pi\u00f9 opzionale, ma una necessit\u00e0.<\/p>\n\n\n\n<p>Fonte:&nbsp;<a href=\"https:\/\/anchor.host\/someone-bought-30-wordpress-plugins-and-planted-a-backdoor-in-all-of-them\/\" target=\"_blank\" rel=\"noreferrer noopener\">anchor.host<\/a>,&nbsp;<a href=\"https:\/\/www.bitdefender.com\/en-us\/blog\/hotforsecurity\/hidden-wordpress-backdoors-admin-accounts\" target=\"_blank\" rel=\"noreferrer noopener\">bitdefender.com<\/a><\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><a href=\"https:\/\/computershop.eu\/it\/computer\/computer-all-in-one\" target=\"_blank\" rel=\" noreferrer noopener\"><img loading=\"lazy\" decoding=\"async\" width=\"940\" height=\"788\" src=\"https:\/\/computershop.eu\/blog\/wp-content\/uploads\/2026\/04\/All-In-One-PC.png\" alt=\"All-In-One PC\" class=\"wp-image-4088\" style=\"aspect-ratio:1.1876926796832497;width:399px;height:auto\" srcset=\"https:\/\/computershop.eu\/blog\/wp-content\/uploads\/2026\/04\/All-In-One-PC.png 940w, https:\/\/computershop.eu\/blog\/wp-content\/uploads\/2026\/04\/All-In-One-PC-300x251.png 300w, https:\/\/computershop.eu\/blog\/wp-content\/uploads\/2026\/04\/All-In-One-PC-768x644.png 768w, https:\/\/computershop.eu\/blog\/wp-content\/uploads\/2026\/04\/All-In-One-PC-358x300.png 358w\" sizes=\"auto, (max-width: 940px) 100vw, 940px\" \/><\/a><\/figure>\n<\/div>\t<div class=\"quickshare-container\">\r\n\t<ul class=\"quickshare-genericons monochrome quickshare-effect-expand\">\r\n\t\t<li class=\"quickshare-share\">Share:<\/li> \r\n\t\t<li><a href=\"https:\/\/facebook.com\/sharer.php?u=https%3A%2F%2Fcomputershop.eu%2Fblog%2Fit%2Fattacco-informatico-su-wordpress-plugin-compromessi&amp;t=Attacco+informatico+su+WordPress%2C+plugin+compromessi+<+Refurbished+Computers+-+ComputerShop.EU\" target=\"_blank\" title=\"Share on Facebook\"><span class=\"quickshare-facebook\">Facebook<\/span><\/a><\/li>\t\t<li><a href=\"https:\/\/twitter.com\/intent\/tweet?url=https%3A%2F%2Fcomputershop.eu%2Fblog%2Fit%2Fattacco-informatico-su-wordpress-plugin-compromessi&amp;text=Attacco+informatico+su+WordPress%2C+plugin+compromessi+<+Refurbished+Computers+-+ComputerShop.EU\" target=\"_blank\" title=\"Share on Twitter\"><span class=\"quickshare-twitter\">Twitter<\/span><\/a><\/li>\t\t<li><a href=\"http:\/\/pinterest.com\/pin\/create\/button\/?url=https%3A%2F%2Fcomputershop.eu%2Fblog%2Fit%2Fattacco-informatico-su-wordpress-plugin-compromessi&amp;media=https%3A%2F%2Fcomputershop.eu%2Fblog%2Fwp-content%2Fuploads%2F2026%2F04%2Fwordpress-300x168.png&amp;description=Un+nuovo+incidente+di+sicurezza+mette+in+evidenza+le+vulnerabilit%C3%A0+dell%27ecosistema+WordPress%2C+una+delle+piattaforme+di+creazione+di+siti+web+pi%C3%B9+popolari+al+mondo.+Decine+di+plugin+utilizzati+da+migliaia+di+siti+web+sono+stati+ritirati+dopo+la+scoperta+di%26hellip%3B\" target=\"_blank\" title=\"Share on Pinterest\"><span class=\"quickshare-pinterest\">Pinterest<\/span><\/a><\/li>\t\t<li><a href=\"http:\/\/linkedin.com\/shareArticle?mini=true&amp;url=https%3A%2F%2Fcomputershop.eu%2Fblog%2Fit%2Fattacco-informatico-su-wordpress-plugin-compromessi&amp;title=Attacco+informatico+su+WordPress%2C+plugin+compromessi&amp;source=Refurbished+Computers+-+ComputerShop.EU&amp;summary=Un+nuovo+incidente+di+sicurezza+mette+in+evidenza+le+vulnerabilit%C3%A0+dell%27ecosistema+WordPress%2C+una+delle+piattaforme+di+creazione+di+siti+web+pi%C3%B9+popolari+al+mondo.+Decine+di+plugin+utilizzati+da+migliaia+di+siti+web+sono+stati+ritirati+dopo+la+scoperta+di%26hellip%3B\" title=\"Share on Linkedin\" target=\"_blank\"><span class=\"quickshare-linkedin\">Linkedin<\/span><\/a><\/li>\t\t<li><a href=\"https:\/\/plus.google.com\/share?url=https%3A%2F%2Fcomputershop.eu%2Fblog%2Fit%2Fattacco-informatico-su-wordpress-plugin-compromessi\" target=\"_blank\" title=\"Share on Google+\"><span class=\"quickshare-googleplus\">Google+<\/span><\/a><\/li>\t\t\t\t\t\t\t\t<li><a href=\"mailto:?subject=Refurbished+Computers+-+ComputerShop.EU:+Attacco+informatico+su+WordPress%2C+plugin+compromessi&amp;body=https%3A%2F%2Fcomputershop.eu%2Fblog%2Fit%2Fattacco-informatico-su-wordpress-plugin-compromessi\" target=\"_blank\" title=\"Share via Email\"><span class=\"quickshare-email\">Email<\/span><\/a><\/li>\t<\/ul>\r\n\t<\/div>\r\n","protected":false},"excerpt":{"rendered":"<p><span class=\"span-reading-time rt-reading-time\" style=\"display: block;\"><span class=\"rt-label rt-prefix\">Reading Time: <\/span> <span class=\"rt-time\"> 2<\/span> <span class=\"rt-label rt-postfix\">minutes<\/span><\/span>Un nuovo incidente di sicurezza mette in evidenza le vulnerabilit\u00e0 dell&#8217;ecosistema WordPress, una delle piattaforme di creazione di siti web pi\u00f9 popolari al mondo. Decine di plugin utilizzati da migliaia di siti web sono stati ritirati dopo la scoperta di &hellip; <a href=\"https:\/\/computershop.eu\/blog\/it\/attacco-informatico-su-wordpress-plugin-compromessi\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":4,"featured_media":4087,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[92],"tags":[15305,7204,15249,4200,15310,15245],"class_list":["post-4096","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-notizie","tag-attacco-informatico-wordpress","tag-cyberattacco","tag-plugin-wordpress","tag-sicurezza-informatica","tag-vulnerabilita-wordpress","tag-wordpress"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Attacco informatico su WordPress, plugin compromessi - Refurbished Computers - ComputerShop.EU<\/title>\n<meta name=\"description\" content=\"Un nuovo incidente di sicurezza mette in evidenza le vulnerabilit\u00e0 di WordPress, la popolare piattaforma di creazione di siti web.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/computershop.eu\/blog\/it\/attacco-informatico-su-wordpress-plugin-compromessi\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Attacco informatico su WordPress, plugin compromessi - Refurbished Computers - ComputerShop.EU\" \/>\n<meta property=\"og:description\" content=\"Un nuovo incidente di sicurezza mette in evidenza le vulnerabilit\u00e0 di WordPress, la popolare piattaforma di creazione di siti web.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/computershop.eu\/blog\/it\/attacco-informatico-su-wordpress-plugin-compromessi\" \/>\n<meta property=\"og:site_name\" content=\"Refurbished Computers - ComputerShop.EU\" \/>\n<meta property=\"article:published_time\" content=\"2026-04-16T06:32:50+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-16T06:39:53+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/computershop.eu\/blog\/wp-content\/uploads\/2026\/04\/wordpress.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1600\" \/>\n\t<meta property=\"og:image:height\" content=\"896\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Alex\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Alex\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/computershop.eu\/blog\/it\/attacco-informatico-su-wordpress-plugin-compromessi#article\",\"isPartOf\":{\"@id\":\"https:\/\/computershop.eu\/blog\/it\/attacco-informatico-su-wordpress-plugin-compromessi\"},\"author\":{\"name\":\"Alex\",\"@id\":\"https:\/\/computershop.eu\/blog\/#\/schema\/person\/0eb808f8e90cce21170267d78190e76a\"},\"headline\":\"Attacco informatico su WordPress, plugin compromessi\",\"datePublished\":\"2026-04-16T06:32:50+00:00\",\"dateModified\":\"2026-04-16T06:39:53+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/computershop.eu\/blog\/it\/attacco-informatico-su-wordpress-plugin-compromessi\"},\"wordCount\":508,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/computershop.eu\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/computershop.eu\/blog\/it\/attacco-informatico-su-wordpress-plugin-compromessi#primaryimage\"},\"thumbnailUrl\":\"https:\/\/computershop.eu\/blog\/wp-content\/uploads\/2026\/04\/wordpress.png\",\"keywords\":[\"attacco informatico wordpress\",\"cyberattacco\",\"plugin wordpress\",\"Sicurezza informatica\",\"vulnerabilit\u00e0 wordpress\",\"wordpress\"],\"articleSection\":[\"Notizie\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/computershop.eu\/blog\/it\/attacco-informatico-su-wordpress-plugin-compromessi#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/computershop.eu\/blog\/it\/attacco-informatico-su-wordpress-plugin-compromessi\",\"url\":\"https:\/\/computershop.eu\/blog\/it\/attacco-informatico-su-wordpress-plugin-compromessi\",\"name\":\"Attacco informatico su WordPress, plugin compromessi - Refurbished Computers - ComputerShop.EU\",\"isPartOf\":{\"@id\":\"https:\/\/computershop.eu\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/computershop.eu\/blog\/it\/attacco-informatico-su-wordpress-plugin-compromessi#primaryimage\"},\"image\":{\"@id\":\"https:\/\/computershop.eu\/blog\/it\/attacco-informatico-su-wordpress-plugin-compromessi#primaryimage\"},\"thumbnailUrl\":\"https:\/\/computershop.eu\/blog\/wp-content\/uploads\/2026\/04\/wordpress.png\",\"datePublished\":\"2026-04-16T06:32:50+00:00\",\"dateModified\":\"2026-04-16T06:39:53+00:00\",\"description\":\"Un nuovo incidente di sicurezza mette in evidenza le vulnerabilit\u00e0 di WordPress, la popolare piattaforma di creazione di siti web.\",\"breadcrumb\":{\"@id\":\"https:\/\/computershop.eu\/blog\/it\/attacco-informatico-su-wordpress-plugin-compromessi#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/computershop.eu\/blog\/it\/attacco-informatico-su-wordpress-plugin-compromessi\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/computershop.eu\/blog\/it\/attacco-informatico-su-wordpress-plugin-compromessi#primaryimage\",\"url\":\"https:\/\/computershop.eu\/blog\/wp-content\/uploads\/2026\/04\/wordpress.png\",\"contentUrl\":\"https:\/\/computershop.eu\/blog\/wp-content\/uploads\/2026\/04\/wordpress.png\",\"width\":1600,\"height\":896,\"caption\":\"wordpress\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/computershop.eu\/blog\/it\/attacco-informatico-su-wordpress-plugin-compromessi#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/computershop.eu\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Attacco informatico su WordPress, plugin compromessi\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/computershop.eu\/blog\/#website\",\"url\":\"https:\/\/computershop.eu\/blog\/\",\"name\":\"Refurbished Computers - ComputerShop.EU\",\"description\":\"Best Refurbished Computers In The EU\",\"publisher\":{\"@id\":\"https:\/\/computershop.eu\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/computershop.eu\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/computershop.eu\/blog\/#organization\",\"name\":\"Refurbished Computers - ComputerShop.EU\",\"url\":\"https:\/\/computershop.eu\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/computershop.eu\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/computershop.eu\/blog\/wp-content\/uploads\/2025\/08\/logo-inverse-footer.png\",\"contentUrl\":\"https:\/\/computershop.eu\/blog\/wp-content\/uploads\/2025\/08\/logo-inverse-footer.png\",\"width\":300,\"height\":54,\"caption\":\"Refurbished Computers - ComputerShop.EU\"},\"image\":{\"@id\":\"https:\/\/computershop.eu\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/computershop.eu\/blog\/#\/schema\/person\/0eb808f8e90cce21170267d78190e76a\",\"name\":\"Alex\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/computershop.eu\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/ac40376cb3b388c90452c10b7c3a589e9c469d972bfc92df578a42f1a1e7fc7f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/ac40376cb3b388c90452c10b7c3a589e9c469d972bfc92df578a42f1a1e7fc7f?s=96&d=mm&r=g\",\"caption\":\"Alex\"},\"url\":\"https:\/\/computershop.eu\/blog\/author\/alex\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Attacco informatico su WordPress, plugin compromessi - Refurbished Computers - ComputerShop.EU","description":"Un nuovo incidente di sicurezza mette in evidenza le vulnerabilit\u00e0 di WordPress, la popolare piattaforma di creazione di siti web.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/computershop.eu\/blog\/it\/attacco-informatico-su-wordpress-plugin-compromessi","og_locale":"en_US","og_type":"article","og_title":"Attacco informatico su WordPress, plugin compromessi - Refurbished Computers - ComputerShop.EU","og_description":"Un nuovo incidente di sicurezza mette in evidenza le vulnerabilit\u00e0 di WordPress, la popolare piattaforma di creazione di siti web.","og_url":"https:\/\/computershop.eu\/blog\/it\/attacco-informatico-su-wordpress-plugin-compromessi","og_site_name":"Refurbished Computers - ComputerShop.EU","article_published_time":"2026-04-16T06:32:50+00:00","article_modified_time":"2026-04-16T06:39:53+00:00","og_image":[{"width":1600,"height":896,"url":"https:\/\/computershop.eu\/blog\/wp-content\/uploads\/2026\/04\/wordpress.png","type":"image\/png"}],"author":"Alex","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Alex","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/computershop.eu\/blog\/it\/attacco-informatico-su-wordpress-plugin-compromessi#article","isPartOf":{"@id":"https:\/\/computershop.eu\/blog\/it\/attacco-informatico-su-wordpress-plugin-compromessi"},"author":{"name":"Alex","@id":"https:\/\/computershop.eu\/blog\/#\/schema\/person\/0eb808f8e90cce21170267d78190e76a"},"headline":"Attacco informatico su WordPress, plugin compromessi","datePublished":"2026-04-16T06:32:50+00:00","dateModified":"2026-04-16T06:39:53+00:00","mainEntityOfPage":{"@id":"https:\/\/computershop.eu\/blog\/it\/attacco-informatico-su-wordpress-plugin-compromessi"},"wordCount":508,"commentCount":0,"publisher":{"@id":"https:\/\/computershop.eu\/blog\/#organization"},"image":{"@id":"https:\/\/computershop.eu\/blog\/it\/attacco-informatico-su-wordpress-plugin-compromessi#primaryimage"},"thumbnailUrl":"https:\/\/computershop.eu\/blog\/wp-content\/uploads\/2026\/04\/wordpress.png","keywords":["attacco informatico wordpress","cyberattacco","plugin wordpress","Sicurezza informatica","vulnerabilit\u00e0 wordpress","wordpress"],"articleSection":["Notizie"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/computershop.eu\/blog\/it\/attacco-informatico-su-wordpress-plugin-compromessi#respond"]}]},{"@type":"WebPage","@id":"https:\/\/computershop.eu\/blog\/it\/attacco-informatico-su-wordpress-plugin-compromessi","url":"https:\/\/computershop.eu\/blog\/it\/attacco-informatico-su-wordpress-plugin-compromessi","name":"Attacco informatico su WordPress, plugin compromessi - Refurbished Computers - ComputerShop.EU","isPartOf":{"@id":"https:\/\/computershop.eu\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/computershop.eu\/blog\/it\/attacco-informatico-su-wordpress-plugin-compromessi#primaryimage"},"image":{"@id":"https:\/\/computershop.eu\/blog\/it\/attacco-informatico-su-wordpress-plugin-compromessi#primaryimage"},"thumbnailUrl":"https:\/\/computershop.eu\/blog\/wp-content\/uploads\/2026\/04\/wordpress.png","datePublished":"2026-04-16T06:32:50+00:00","dateModified":"2026-04-16T06:39:53+00:00","description":"Un nuovo incidente di sicurezza mette in evidenza le vulnerabilit\u00e0 di WordPress, la popolare piattaforma di creazione di siti web.","breadcrumb":{"@id":"https:\/\/computershop.eu\/blog\/it\/attacco-informatico-su-wordpress-plugin-compromessi#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/computershop.eu\/blog\/it\/attacco-informatico-su-wordpress-plugin-compromessi"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/computershop.eu\/blog\/it\/attacco-informatico-su-wordpress-plugin-compromessi#primaryimage","url":"https:\/\/computershop.eu\/blog\/wp-content\/uploads\/2026\/04\/wordpress.png","contentUrl":"https:\/\/computershop.eu\/blog\/wp-content\/uploads\/2026\/04\/wordpress.png","width":1600,"height":896,"caption":"wordpress"},{"@type":"BreadcrumbList","@id":"https:\/\/computershop.eu\/blog\/it\/attacco-informatico-su-wordpress-plugin-compromessi#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/computershop.eu\/blog\/"},{"@type":"ListItem","position":2,"name":"Attacco informatico su WordPress, plugin compromessi"}]},{"@type":"WebSite","@id":"https:\/\/computershop.eu\/blog\/#website","url":"https:\/\/computershop.eu\/blog\/","name":"Refurbished Computers - ComputerShop.EU","description":"Best Refurbished Computers In The EU","publisher":{"@id":"https:\/\/computershop.eu\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/computershop.eu\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/computershop.eu\/blog\/#organization","name":"Refurbished Computers - ComputerShop.EU","url":"https:\/\/computershop.eu\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/computershop.eu\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/computershop.eu\/blog\/wp-content\/uploads\/2025\/08\/logo-inverse-footer.png","contentUrl":"https:\/\/computershop.eu\/blog\/wp-content\/uploads\/2025\/08\/logo-inverse-footer.png","width":300,"height":54,"caption":"Refurbished Computers - ComputerShop.EU"},"image":{"@id":"https:\/\/computershop.eu\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/computershop.eu\/blog\/#\/schema\/person\/0eb808f8e90cce21170267d78190e76a","name":"Alex","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/computershop.eu\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/ac40376cb3b388c90452c10b7c3a589e9c469d972bfc92df578a42f1a1e7fc7f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ac40376cb3b388c90452c10b7c3a589e9c469d972bfc92df578a42f1a1e7fc7f?s=96&d=mm&r=g","caption":"Alex"},"url":"https:\/\/computershop.eu\/blog\/author\/alex"}]}},"jetpack_featured_media_url":"https:\/\/computershop.eu\/blog\/wp-content\/uploads\/2026\/04\/wordpress.png","jetpack_sharing_enabled":true,"jetpack-related-posts":[],"_links":{"self":[{"href":"https:\/\/computershop.eu\/blog\/wp-json\/wp\/v2\/posts\/4096","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/computershop.eu\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/computershop.eu\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/computershop.eu\/blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/computershop.eu\/blog\/wp-json\/wp\/v2\/comments?post=4096"}],"version-history":[{"count":1,"href":"https:\/\/computershop.eu\/blog\/wp-json\/wp\/v2\/posts\/4096\/revisions"}],"predecessor-version":[{"id":4099,"href":"https:\/\/computershop.eu\/blog\/wp-json\/wp\/v2\/posts\/4096\/revisions\/4099"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/computershop.eu\/blog\/wp-json\/wp\/v2\/media\/4087"}],"wp:attachment":[{"href":"https:\/\/computershop.eu\/blog\/wp-json\/wp\/v2\/media?parent=4096"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/computershop.eu\/blog\/wp-json\/wp\/v2\/categories?post=4096"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/computershop.eu\/blog\/wp-json\/wp\/v2\/tags?post=4096"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}