{ "dataType": "CVE_RECORD", "dataVersion": "5.2", "cveMetadata": { "cveId": "CVE-2026-6443", "assignerOrgId": "b15e7b5b-3da4-40ae-a43c-f7aa60e62599", "state": "PUBLISHED", "assignerShortName": "Wordfence", "dateReserved": "2026-04-16T18:22:16.366Z", "datePublished": "2026-04-17T06:44:49.128Z", "dateUpdated": "2026-04-17T06:44:49.128Z" }, "containers": { "cna": { "providerMetadata": { "orgId": "b15e7b5b-3da4-40ae-a43c-f7aa60e62599", "shortName": "Wordfence", "dateUpdated": "2026-04-17T06:44:49.128Z" }, "affected": [ { "vendor": "essentialplugin", "product": "Accordion and Accordion Slider", "versions": [ { "version": "1.4.6", "status": "affected" } ], "defaultStatus": "unaffected" } ], "descriptions": [ { "lang": "en", "value": "The Accordion and Accordion Slider plugin for WordPress is vulnerable to an injected backdoor in version 1.4.6. This is due to the plugin being sold to a malicious threat actor that embedded a backdoor in all of the plugin's they acquired. This makes it possible for the threat actor to maintain a persistent backdoor and inject spam into the affected sites." } ], "title": "Accordion and Accordion Slider 1.4.6 - Injected Backdoor", "references": [ { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/2597724a-9a39-4e46-b153-f42366f833ba?source=cve" }, { "url": "https://anchor.host/someone-bought-30-wordpress-plugins-and-planted-a-backdoor-in-all-of-them/" } ], "problemTypes": [ { "descriptions": [ { "lang": "en", "description": "CWE-506 Embedded Malicious Code", "cweId": "CWE-506", "type": "CWE" } ] } ], "metrics": [ { "cvssV3_1": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "baseScore": 9.8, "baseSeverity": "CRITICAL" } } ], "credits": [ { "lang": "en", "type": "finder", "value": "Eu Joe Chegne" }, { "lang": "en", "type": "finder", "value": "Damien" } ], "timeline": [ { "time": "2026-04-16T18:38:10.000Z", "lang": "en", "value": "Vendor Notified" }, { "time": "2026-04-09T00:00:00.000Z", "lang": "en", "value": "Disclosed" } ] } } }