Thursday, April 24, 2025
HomeCyber Security NewsStealthy Malware in WordPress Sites Enables Remote Code Execution by Hackers

Stealthy Malware in WordPress Sites Enables Remote Code Execution by Hackers

Published on

SIEM as a Service

Follow Us on Google News

Security researchers have uncovered sophisticated malware targeting WordPress websites, leveraging hidden backdoors to enable remote code execution (RCE).

These attacks exploit vulnerabilities in WordPress core features and plugins, allowing hackers to gain unauthorized access, execute arbitrary code, and maintain control over compromised sites.

The findings highlight the critical need for robust security measures in WordPress environments.

- Advertisement - Google News

Exploiting WordPress Vulnerabilities for Persistent Access

One notable case involved attackers embedding malicious scripts within the Must-Use Plugins (mu-plugins) directory, a special WordPress folder that automatically loads plugins on every page load without requiring activation.

By placing obfuscated PHP code in this directory, attackers ensured persistence while evading detection.

The malicious code retrieved and executed additional payloads stored in external files, enabling hackers to execute commands remotely and compromise the website further.

The malware employs advanced obfuscation techniques, such as base64 encoding and AES encryption, to conceal its payloads and bypass detection.

Once executed, it communicates with external servers to fetch additional malicious scripts or send sensitive data.

Attackers also use functions like eval() to dynamically execute PHP code, further complicating detection efforts.

In one instance, the malware exploited the /wp-content/uploads/ directory to store obfuscated payloads.

These payloads were decoded and executed on the server, granting attackers full control over the site.

Additionally, some variants manipulated critical files like robots.txt to redirect traffic or enhance their search engine optimization (SEO) spam campaigns.

The potential consequences of such attacks are severe:

  • Complete Site Takeover: Hackers can modify content, inject malicious scripts, or deface websites.
  • Data Theft: Sensitive user information, including login credentials and financial data, can be exfiltrated.
  • Malware Distribution: Compromised sites may be used to spread malware or phishing campaigns.
  • Reputation Damage: Redirecting visitors or injecting spam content harms a website’s credibility and SEO rankings.

The rise of RCE vulnerabilities in WordPress underscores systemic issues related to insecure coding practices and outdated software.

Sucuri reports revealed similar vulnerabilities in popular plugins like “Bit File Manager” and “Security & Malware Scan by CleanTalk,” exposing tens of thousands of websites to exploitation.

Attackers exploited flaws in file upload mechanisms or insufficient input sanitization to inject malicious code.

To mitigate these threats, WordPress site administrators should:

  1. Regularly update WordPress core, plugins, and themes.
  2. Implement firewalls to block malicious traffic.
  3. Disable PHP execution in directories like /uploads/.
  4. Use security tools like Sucuri or MalCare for malware scanning and monitoring.
  5. Conduct periodic audits of installed plugins and remove unused or outdated ones.

These measures are essential for reducing the attack surface and safeguarding against evolving cyber threats targeting WordPress ecosystems.

PCI DSS 4.0 & Supply Chain Attack Prevention – Free Webinar

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Multiple Cisco Tools at Risk from Erlang/OTP SSH Remote Code Execution Flaw

Cisco has issued a high-severity advisory (cisco-sa-erlang-otp-ssh-xyZZy) warning of a critical remote code execution...

Commvault RCE Vulnerability Exploited—PoC Released

Enterprises and managed service providers globally are now facing urgent security concerns following the...

Zyxel RCE Flaw Lets Attackers Run Commands Without Authentication

Security researcher Alessandro Sgreccia (aka "rainpwn") has revealed a set of critical vulnerabilities in...

Redis DoS Flaw Allows Attackers to Crash Servers or Drain Memory

A high-severity denial-of-service (DoS) vulnerability in Redis, tracked as CVE-2025-21605, allows unauthenticated attackers to crash...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Multiple Cisco Tools at Risk from Erlang/OTP SSH Remote Code Execution Flaw

Cisco has issued a high-severity advisory (cisco-sa-erlang-otp-ssh-xyZZy) warning of a critical remote code execution...

Commvault RCE Vulnerability Exploited—PoC Released

Enterprises and managed service providers globally are now facing urgent security concerns following the...

Zyxel RCE Flaw Lets Attackers Run Commands Without Authentication

Security researcher Alessandro Sgreccia (aka "rainpwn") has revealed a set of critical vulnerabilities in...