Gravity Forms Fiasco: How a Supply Chain Attack Bamboozled WordPress Users
Gravity Forms, the beloved WordPress plugin, took a surprise detour into villainy with two trojanized versions. These plugins, distributed via the official download page, were caught sending WordPress installation details to a suspicious domain. Users are urged to update to version 2.9.13 to banish the unwelcome code.

Hot Take:
Well, folks, it seems like the digital equivalent of finding a cockroach in your cereal just happened! What do you get when you cross a popular WordPress plugin with a supply chain attack? A trojanized Gravity Forms plugin, of course! It’s as if someone took your favorite Swiss army knife and swapped out the corkscrew for a ticking time bomb. Let’s just say, WordPress users had a less-than-gravity-defying week.
Key Points:
- Gravity Forms, a widely-used WordPress plugin, was compromised in a supply chain attack.
- Two versions, 2.9.11.1 and 2.9.12, were infected and available for manual download.
- The malicious code allowed remote execution of arbitrary code by unauthenticated users.
- RocketGenius released version 2.9.13 to remove the malicious code and urges immediate updates.
- Auto-updates and the Gravity API service were not compromised in the attack.
Already a member? Log in here