JustAppSec
Back to news

Injected backdoor in WordPress plugin enables persistent compromise

1 min readPublished 17 Apr 2026Source: CVEProject (cvelistV5)

TL;DR — A compromised WordPress plugin release (Accordion and Accordion Slider v1.4.6) contains embedded malicious code, turning routine plugin updates into a persistence and spam-injection path for affected sites.

What happened

Accordion and Accordion Slider is a WordPress plugin that adds accordion/slider UI components to sites.

CVE-2026-6443 describes an injected backdoor in version 1.4.6, attributed to the plugin being sold to a malicious threat actor who embedded a backdoor across acquired plugins. The CVE states this enables the actor to maintain a persistent backdoor and inject spam into affected sites.

Severity is CVSS v3.1 9.8 (Critical) with a network attack vector and no privileges required. This is operationally high-risk because it abuses the WordPress plugin supply chain: the update channel becomes the initial access vector, and the blast radius is “every site that installed the compromised build.”

Who is impacted

  • WordPress sites running Accordion and Accordion Slider version 1.4.6.
  • Teams that vendor, mirror, or bake WordPress plugins into deployment artifacts (e.g., container images, AMIs, golden backups) where 1.4.6 may be present even if later removed upstream.

What to do now

  • Follow vendor / maintainer remediation guidance referenced by the CVE record (see the CNA references in the CVE JSON).
  • Identify where accordion-and-accordion-slider is installed and determine whether any environment is running 1.4.6 (production, staging, and “forgotten” sites).
  • Treat this as a potential compromise rather than a “patch later” bug: verify site integrity (plugin files, wp-config.php, MU-plugins, scheduled tasks/cron hooks) and rotate credentials reachable by the WordPress process per your incident response playbooks.
  • Audit your plugin supply chain controls: restrict who can install/update plugins, require provenance review for plugin owner changes, and prefer controlled update pipelines (staging promotion, checksums, allowlists) for high-impact sites.

Content is AI-assisted and reviewed by our team, but issues may be missed and best practices evolve rapidly, send corrections to [email protected]. Always consult official documentation and validate key implementation decisions before making design or security choices.

Need help?Get in touch.