WordPress security advisory: Smart Slider 3 Pro 3.5.1.35 compromise
Description
A security breach affected the update system responsible for distributing Smart Slider 3 Pro for WordPress. Unauthorized parties released a malicious version 3.5.1.35, which may have been installed on some websites.
Once detected, the update infrastructure was shut down and a full security audit was performed. A fixed and secure version 3.5.1.36 has been released.
⚠️ Important: Only the Pro version is affected.
The malware in the WordPress version differs from Joomla and includes deeper persistence mechanisms.
👉 A cleanup plugin is available to automatically remove the infection:
Affected Versions
| Version | Status | Action Required |
|---|---|---|
| 3.5.1.35 | ❌ Compromised | Immediate action required |
| 3.5.1.36 | ✅ Safe | No action needed |
| ≤ 3.5.1.34 | ✅ Safe | No action needed |
What the Malware Does (WordPress)
The malicious plugin version includes multiple backdoors and persistence layers.
It may:
-
Execute system commands remotely via HTTP headers (
shell_exec)Execute arbitrary PHP code via hidden request parameters
Create a hidden administrator user:
- username:
wpsvc_xxxx -
email:
kiziltxt2@gmail.comHide this user from the admin interface
Store credentials in WordPress options (
_wpc_uinfo)Install persistent backdoors in multiple locations:
wp-content/mu-plugins/object-cache-helper.php- theme
functions.php wp-includes/class-wp-locale-helper.php
- username:
- Send site and credential data to an external server (
wpjs1.com)
Because of this, affected sites should be considered fully compromised.
🔄 Server Rollback
If you have an available backup point, we strongly recommend rolling back your server to a backup created before version 3.5.1.35.
The compromised update was released by the attacker on April 7, 2026. Due to time zone differences, it is safest to restore from a backup dated April 5, 2026 or earlier.
This ensures that any potentially malicious files are completely removed, as they were never present in the restored backup.
How to Roll Back
- Log in to your server hosting provider’s dashboard
- Look for a section related to backups, snapshots, or restore points
- Find a backup created before version 3.5.1.35
- Use the available restore/rollback option to restore that backup
⚠️ Backup and restore options vary between providers.
If you’re unsure how to proceed, please contact your hosting provider’s support for assistance.
Reset Your Credentials
After restoring your server, it is still recommended to regenerate your credentials as described below, as the attacker might have accessed them.
If you don't have a backup, then proceed with the automatic or the manual cleanup methods described below.
✅ Recommended Cleanup Method (Automatic)
We strongly recommend using the official cleanup plugin.
Steps
- Download the cleanup plugin:
-
https://nextendweb.com/public/cleanup.zip
In WordPress admin:
- Go to Plugins → Add New → Upload Plugin
- Upload the ZIP file
-
Install and activate
The plugin will automatically:
- Remove malicious files
- Delete the hidden admin user
- Clean infected theme files
- Remove persistence mechanisms
-
Delete malicious options (
_wpc_*)Optional after completion:
- Check the log file:
-
wp-content/uploads/malware-cleanup.log
- Deactivate and delete the cleanup plugin
🛠 Manual Cleanup Guide (If Not Using the Plugin)
Follow these steps carefully.
1. Update Immediately
- Remove version 3.5.1.35
- Install 3.5.1.36 from a trusted source
2. Put Site in Maintenance Mode
Temporarily restrict access to prevent further exploitation.
3. Backup the Site
Create a full backup of:
- Files
- Database
Label it as infected backup.
4. Remove Malicious Plugin
Delete the entire plugin directory:
wp-content/plugins/nextend-smart-slider3-pro/
⚠️ Do not leave any files behind.
5. Remove Hidden Admin User
Check all users in WordPress.
Look for:
- username starting with:
wpsvc_ - email:
kiziltxt2@gmail.com
Delete this user immediately.
6. Remove Persistence Files
Delete these files if they exist:
wp-content/mu-plugins/object-cache-helper.php wp-includes/class-wp-locale-helper.php wp-includes/.cache_key
These are hidden backdoors that allow re-entry.
7. Clean Theme functions.php
Check all active themes:
wp-content/themes/<your-theme>/functions.php
Remove this malicious pattern:
add_action('init',function(){ ... eval(...) ... shell_exec(...) ... });
This code enables remote execution.
8. Remove Malicious WordPress Options
In database (wp_options table), delete:
_wpc_ak_wpc_uid_wpc_uinfo
These store attacker access keys and credentials.
9. Reinstall WordPress Core
Replace all core files with a clean version:
-
Download WordPress from official source
Replace everything except:
wp-config.phpwp-content/uploads/
10. Reinstall Plugins and Themes
- Remove all plugins
- Reinstall only from trusted sources
- Remove unused or nulled plugins
11. Change All Passwords
Reset:
- WordPress admin passwords
- WordPress security keys (salts)
- Hosting account
- FTP / SSH
- Database password
- Email accounts
How to reset the WordPress admin passwords:
- Log in to your WordPress dashboard:
/wp-admin - Go to Users → All Users (
/wp-admin/users.php) - For each user with the Administrator role:
- Click Edit
- Scroll down to the Account Management section
- Click Set New Password (WordPress will generate a strong password automatically)
- Click Update User to save
- Tip: You can also use the “Send password reset” option so each administrator can set their own password securely.
How to change the WordPress Security Keys (Salts):
-
Generate new security keys here:
- Open your website’s
wp-config.phpfile - Replace the existing keys (AUTH_KEY, SECURE_AUTH_KEY, etc.) with the new ones ( please make sure you won't add them twice, but you actually replace the existing salts with the new ones, as defining constants twice could causes errors )
- Save the file
This will also log out all users and invalidate existing sessions.
Changing the Database password:
Please contact your hosting provider for guidance on how to change your WordPress database user password.
After changing it:
- Open
wp-config.php - Update the value of this constant to the new password that you generated:
define('DB_PASSWORD', 'your-new-password');
Changing the FTP / SSH and Hosting account credentials:
Please contact your hosting provider for guidance on how to change these credentials.
12. Scan for Additional Malware
Search for:
eval(base64_decodeshell_exec_wpc_wpjs1.com
Check especially:
wp-content/uploads/cache/mu-plugins/
13. Review Logs
Check:
- access logs
- admin logins
- unusual POST requests
Look for:
_chkparameter- base64 payloads
- unknown admin access
14. Harden the Site
After cleanup:
- Enable 2FA for admins
- Disable PHP execution in uploads folder
- Keep everything updated
- Use strong passwords
- Limit admin access
Summary
- A malicious version (3.5.1.35) was briefly distributed
- A fixed version (3.5.1.36) is available
- Only Pro version is affected
- Infection includes admin creation, backdoors, and remote execution
- Use the cleanup plugin for easiest recovery
- Manual cleanup is possible but requires careful verification
Final Recommendation
If version 3.5.1.35 was installed:
👉 Treat the site as fully compromised
👉 Perform a full audit
👉 Reset all credentials
If unsure, involve a security professional.