Widespread WordPress Redirect Plugin Discovered to Contain Long-Standing Backdoor

Try Our Free Tools!
Master the web with Free Tools that work as hard as you do. From Text Analysis to Website Management, we empower your digital journey with expert guidance and free, powerful tools.

Quick Page/Post Redirect Removed for Review

A widely adopted WordPress redirect plugin has been temporarily withdrawn from WordPress.org following the discovery of a concealed backdoor linked to its older versions.

The Quick Page/Post Redirect plugin, utilized to facilitate the management of page, post, and custom URL redirects, boasts an active user base exceeding 70,000 installations.

This alarming issue came to light through the diligence of Austin Ginder, the founder of Anchor, a WordPress hosting service.

Security warnings emerged from a dozen customer sites, raising questions about the integrity of the plugin.

The origins of the dormant code—whether it was intentionally embedded by the original developer or if the project itself had been compromised—remain ambiguous.

External Update Channel Elevated the Risk

Upon investigation, Ginder discovered that official releases 5.2.1 and 5.2.2, issued between 2020 and 2021, contained a covert self-update feature that connected to an external domain, anandnet[.]com.

This mechanism permitted the transmission of code that circumvented the usual scrutiny of the WordPress.org review process.

In March 2021, websites utilizing these versions purportedly received a modified 5.2.3 build from this external source.

This tampered package possessed a different hash than its WordPress.org counterpart and introduced a discreet backdoor designed to evade detection.

Backdoor Appears Linked to SEO Spam

The malicious code seems to have been activated exclusively for logged-out visitors, thus eluding the vigilance of administrators.

This backdoor integrated itself into WordPress content rendering, retrieving instructions from the external Anandnet infrastructure—behavior consistent with cloaked parasitic or SEO spam-injection operations.

The overarching concern lies within the update mechanism itself. Even if the command-and-control (C2) subdomain is currently dormant, the affected installations may still be harboring code capable of accepting arbitrary updates if the infrastructure were to become accessible once more.

What Site Owners Should Know

Administrators currently utilizing Quick Page/Post Redirect are advised to conduct a thorough audit of installed versions, particularly focusing on 5.2.1, 5.2.2, and the externally delivered 5.2.3 builds.

Security personnel should compare plugin hashes, monitor outbound requests, and scrutinize indexed pages for any signs of injected spam.

The prudent approach is to completely remove the plugin and await the release of a verified, clean WordPress.org version 5.2.4 for reinstallation.

Blue circle icon with two interlocking plugs, one featuring the WordPress logo, symbolizing WordPress plugins or connectivity.

In the interim, affected websites should treat this plugin as a supply-chain risk to their operational security.

Source link: Bitdefender.com.

Disclosure: This article is for general information only and is based on publicly available sources. We aim for accuracy but can't guarantee it. The views expressed are the author's and may not reflect those of the publication. Some content was created with help from AI and reviewed by a human for clarity and accuracy. We value transparency and encourage readers to verify important details. This article may include affiliate links. If you buy something through them, we may earn a small commission — at no extra cost to you. All information is carefully selected and reviewed to ensure it's helpful and trustworthy.

Reported By

Souvik Banerjee

I’m Souvik Banerjee from Kolkata, India. As a Marketing Manager at RS Web Solutions (RSWEBSOLS), I specialize in digital marketing, SEO, programming, web development, and eCommerce strategies. I also write tutorials and tech articles that help professionals better understand web technologies.
Share the Love
Related News Worth Reading