A key WordPress feature has been hijacked to display malicious code, spam images


  • Scientists from Sucuri found malicious code stored in the MU-plugins library
  • Malware redirected visitors, served spam and could even drop malware
  • The sites were compromised through vulnerable plugins, bad admin -password codes and more

A special library in WordPress is abused to host malicious code, researchers have claimed that the warned code allows threat players to remain lasting on vulnerable sites while performing arbitrary code, redirecting people to malicious websites and showing unwanted spam and ads.

Researchers from Sucuri discovered threat actors hidden malicious code in the “MU-plugins” (abbreviated to Must-Muse-plugins), a library that stores plugins that are activated automatically and cannot be deactivated through the Admin panel.

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top