Over the past month we have covered supply chain attacks on medical equipment suppliers, AI software libraries, a telephony toolkit, and an AI coding tool. Each time, the mechanism has been the same: attackers find a way into a trusted update system, swap the legitimate contents for something malicious, and let the trust do the rest.
Last week it happened again. This time the target was not developer software or enterprise infrastructure. It was the kind of tool used by small businesses, charities, schools, and independent website owners the world over. If you or someone you know runs a website built on WordPress or Joomla, this story is worth knowing about.
What actually happened
Smart Slider 3 Pro is a plugin — a small piece of add-on software — used on more than 800,000 websites worldwide. It lets website owners create image carousels, sliding banners, and visual displays without needing to write any code. It is exactly the kind of tool a small business, a local charity, or a school might use to make their website look professional.
On 7 April 2026, attackers gained unauthorised access to the update system run by Nextend, the company that makes Smart Slider 3 Pro. They replaced the legitimate update with a version they had built themselves — one that looked and worked identically to the real plugin, but contained hidden code designed to take full control of any website that installed it.
The compromised version, numbered 3.5.1.35, was available through the official update channel for approximately six hours before it was detected and removed. A clean replacement version — 3.5.1.36 — was released shortly after.
Any website running Smart Slider 3 Pro that updated automatically during that six-hour window received what security researchers described as a fully weaponised remote access toolkit. The plugin looked normal. It worked normally. It was not normal.
Who was affected, and for how long?
Any website running the Pro version of Smart Slider 3 that updated on or around 7 April 2026 should be treated as potentially compromised. The free version of the plugin, distributed through the WordPress.org repository, was not affected.
How many sites installed the malicious version is not yet publicly confirmed. Given that over 800,000 sites use the plugin in some form, and that many website owners have automatic updates enabled — which is generally good practice — the exposure window is significant even at six hours.
Nextend has published detailed cleanup guidance and urges affected site owners to restore from a backup dated 5 April 2026 or earlier if possible, to account for time zone differences. If no clean backup exists, a manual cleanup process is required. Critically, simply updating to the clean version 3.5.1.36 is not sufficient if the compromised version was ever installed — the malware installs itself in multiple hidden locations and must be actively removed.
Nextend has not yet published a full post-incident report explaining how the attackers gained access to their update infrastructure.
What the malicious update actually did
This is worth explaining in plain English, because it illustrates why supply chain attacks are so effective and so dangerous.
The compromised plugin looked and behaved completely normally — website visitors would have noticed nothing. But hidden inside it were multiple backdoors: secret entry points that allowed the attackers to send commands to the website remotely without needing a username or password. They could run any code they chose, access any file on the server, and take complete control.
The malware also created a hidden administrator account on each affected site — invisible to the website owner when checking user lists — and automatically sent the site's admin credentials, database name, and a full inventory of everything it had done back to an attacker-controlled server.
Most worryingly, simply removing the plugin afterwards was not enough. The malicious code had installed copies of itself in three separate hidden locations, specifically so it could survive a plugin removal. Security researchers described it as a multi-layered persistence toolkit — designed from the ground up to be difficult to find and difficult to remove.
Why does this keep happening?
This is the fifth supply chain attack we have covered in four weeks on this site. Stryker in mid-March. LiteLLM and telnyx in late March. The Claude Code ecosystem in early April. And now Smart Slider in the second week of April.
That is not a coincidence. It is a pattern. And it is worth understanding why.
Supply chain attacks work because they exploit trust — the most efficient currency in software. When a developer or a website owner clicks "update," they are not checking whether the update is safe. They are trusting that the company who built the software has kept its own systems secure. Most of the time that trust is warranted. When it is not, the attacker inherits everything.
These attacks have become more common for two connected reasons. First, the software we use every day — whether to run a business, build an AI tool, or manage a website — is increasingly assembled from many small components made by many different people. Each component is a potential entry point. Second, attackers have realised that targeting the update infrastructure of a widely used tool is far more efficient than attacking each victim individually. Compromise one, reach thousands.
Each of the attacks we have covered this month has reached a different audience. Stryker reached hospitals. LiteLLM reached AI developers. The Claude Code incident reached developers and curious technologists. Smart Slider reaches small business owners, charities, and anyone who runs a website for a community they care about.
The mechanism is the same. The human decisions behind it are the same. Only the target changes.
What does this mean for me?
If you run a website on WordPress or Joomla and use Smart Slider 3 Pro, check your plugin version immediately. If you are on version 3.5.1.35, treat your site as compromised and follow Nextend's cleanup guidance at smartslider3.com. Update to 3.5.1.36 or later, but do not assume that updating alone is sufficient if the compromised version was ever installed.
If you manage a website for someone else — a local club, a charity, a small business — it is worth checking for them. Many website owners do not monitor security advisories and will not know this happened.
For everyone: this story is a reminder that supply chain attacks are no longer something that only affects large organisations and software developers. The exact same mechanism that hit AI development tools last week hit small business websites this week. The scale is different. The method is identical.
The single most protective habit remains the same one we noted last week: do not auto-update critical systems the moment an update appears. Waiting 24 to 48 hours gives security researchers time to catch compromised releases before they reach you. In this case, the window was six hours — which means the habit would not have helped everyone. But it would have helped many.
The broader lesson
A month ago, if you had asked most people whether a small plugin update on a local charity's website could be connected to the same pattern of attacks hitting global AI infrastructure and medical device suppliers, the answer would have been no. That connection now exists and is visible.
The humans behind these attacks are not targeting sectors at random. They are targeting trust itself. The trust between a software maker and its users. The trust embedded in the word "update." The trust that makes modern technology usable at all.
That trust is worth defending — by the companies who build software, through better security around their own publishing infrastructure, and by the people who use it, through a little healthy scepticism about the word "update now."
🧠 The Human Factor
| Technology involved | Smart Slider 3 Pro WordPress and Joomla plugin (version 3.5.1.35), distributed via Nextend's official update infrastructure |
| Root cause | Attackers gained unauthorised access to the plugin's update system and replaced a legitimate release with malicious code — exploiting the trust website owners place in official software updates |
| What was at risk | Full administrative control of affected websites; stored credentials; database contents; any customer or user data held on the site |
| Prevention | Delay auto-updates by 24–48 hours on critical systems; use a backup strategy that allows rollback to a clean state; check plugin version immediately if running Smart Slider 3 Pro |
References and sources
- Nextend security advisory for WordPress and Joomla (April 2026) — smartslider3.com
- Patchstack full malware analysis: Critical Supply Chain Compromise in Smart Slider 3 Pro (April 2026) — patchstack.com
- Backdoored Smart Slider 3 Pro Update Distributed via Compromised Nextend Servers — The Hacker News (April 2026)
- Smart Slider updates hijacked to push malicious WordPress, Joomla versions — BleepingComputer (April 2026)
- Top WordPress Slider plugin hijacked to spread malware — TechRadar (April 2026)