More than 40,000 WordPress sites affected by malware flaw

A vulnerability in a popular WordPress quiz plugin has impacted over 40,000 sites, allowing potential SQL injection attacks. Security researchers have identified the flaw, urging site owners to check for exposure. The issue was reported on February 4, 2026.

The cybersecurity community has raised alarms over a newly discovered malware flaw targeting WordPress sites. According to reports, more than 40,000 installations are at risk due to a vulnerability in a widely used quiz plugin. This plugin, which enables interactive quizzes on websites, contains a weakness that can be exploited for SQL injection attacks.

SQL injection is a common hacking technique where attackers insert malicious code into a query, potentially stealing data or disrupting site functions. The flaw's discovery highlights ongoing challenges in securing content management systems like WordPress, which powers a significant portion of the web.

Site administrators are advised to review their plugins and apply any available updates or patches immediately. While specific details on the plugin's name were not disclosed in initial reports, the scale of the affected sites underscores the urgency of the situation. TechRadar published the findings on February 4, 2026, emphasizing the need for users to verify if their sites are compromised.

This incident serves as a reminder of the importance of regular security audits for WordPress users. No further details on exploitation or mitigation steps were provided in the initial alert, but experts recommend monitoring for unusual activity.

Related Articles

Illustration of a developer's desk with a computer screen showing malicious npm packages stealing credentials across platforms, highlighting cybersecurity risks.
Image generated by AI

Malicious npm packages steal developer credentials on multiple platforms

Reported by AI Image generated by AI

Ten typosquatted npm packages, uploaded on July 4, 2025, have been found downloading an infostealer that targets sensitive data across Windows, Linux, and macOS systems. These packages, mimicking popular libraries, evaded detection through multiple obfuscation layers and amassed nearly 10,000 downloads. Cybersecurity firm Socket reported the threat, noting the packages remain available in the registry.

Microsoft has issued an emergency patch for a worrying security flaw in its Office software. The vulnerability could allow hackers to access users' files if not updated promptly. The patch was released to address this critical issue.

Reported by AI

Russian state-sponsored hackers quickly weaponized a newly patched Microsoft Office flaw to target organizations in nine countries. The group, known as APT28, used spear-phishing emails to install stealthy backdoors in diplomatic, defense, and transport entities. Security researchers at Trellix attributed the attacks with high confidence to this notorious cyber espionage unit.

A critical vulnerability in Canonical's Snap Store allows attackers to hijack abandoned Linux applications by purchasing expired domains. This method enables malicious updates to be pushed automatically to users' systems. The issue was highlighted in an analysis by former Canonical engineer Alan Pope.

Reported by AI

Hackers have accessed and stolen personal information from millions of Pornhub users, aiming to use the data for extortion schemes. The incident was highlighted in a WIRED security news roundup.

Korean Air, a major South Korean airline, has been affected by a supply-chain attack originating from Oracle, resulting in the exposure of thousands of its employees' information. The incident highlights vulnerabilities in third-party software services. Details emerged in a recent security report.

Reported by AI

Linux systems face significant risks from unpatched vulnerabilities, challenging the notion of their inherent security. Experts emphasize the need for automated patch management to protect open-source enterprises effectively.

 

 

 

This website uses cookies

We use cookies for analytics to improve our site. Read our privacy policy for more information.
Decline