Nulled WordPress plugins can cause a severe level of damage to your website.

In March 2026, the Higher Penetration Testing Team identified several critical vulnerabilities in the nulled version of the “WPForms Pro” WordPress plugin. At that point, the compromised plugin had been downloaded and installed on more than 200,000 websites.

Despite previous and ongoing warnings about the dangers of using nullified plugins, many website administrators continue to do so, leading to risks such as data breaches, exploitation of API endpoints, and manipulation of website content.

For example, they may inject malware that can compromise your files, steal administrator credentials, or create unauthorized backdoors for hackers to exploit. Other common risks include redirecting users to malicious sites, inserting spam links, or even deleting important data from your website. These specific threats can result in financial loss, damage to reputation, and the loss of sensitive information for both site owners and their users.

black flat screen computer monitor

These nulled WordPress plugins are installed on more than 200,000 websites and are estimated to be growing rapidly. Many websites that sell or offer free WordPress plugins may use them to steal highly sensitive user data or carry out malicious activities. Such sites often target victims and later deny them access to services.

In the following screenshots, you can see the usage of users who are installed. There are more websites that are not currently indexed by Google. These websites identify that most of the potential vulnerabilities are hidden injections in them. However, our team tried to download extensions in these WordPress plugins, which helped us to identify what the actual issue was.

Some of the common WordPress plugins on websites:

Plugin NamePrimary UseSafe / Risk LevelMonthly InstallsSeverity is Nulled
WPForms ProContact Forms (drag-and-drop, AI, payment integration)Risk is null200,000+Critical
Yoast SEOSEO optimization, readability analysis, XML sitemapsSafe5,000,000+High
Wordfence SecurityFirewall, malware scanner, login protectionSafe4,000,000+Critical if nulled
WooCommerceFull eCommerce store, products, subscriptionsSafe5,000,000+High
ElementorPage builder, drag-and-drop, responsive designSafe5,000,000+Medium if nulled
UpdraftPlusBackup & restore, cloud storage, migrationSafe3,000,000+High if nulled
Akismet Anti-SpamSpam protection, auto-filteringSafe5,000,000+Medium if nulled
WP RocketCaching & performancePaid only1,000,000+High if nulled
Rank Math SEOSEO, AI tools, WooCommerce SEOSafe1,000,000+Medium if nulled
JetpackSecurity, performance, CDN, backupsSafe5,000,000+High if nulled
SmushImage optimization, lazy loadingSafe1,000,000+Medium if nulled
Contact Form 7Simple contact forms, shortcode-basedSafe5,000,000+High if nulled

Legend for Severity:

  • Critical → Full site compromise possible (admin takeover, malware injection, API & JWT exploitation)
  • High → Sensitive data exposure, backdoor potential
  • Medium → Performance issues, spam injection, minor data risks
Here is the example of vulnerable WordPress null plugin code that can be a possibility. It exists on your website if you have installed it from an unverified source
How can I identify if a plugin is nulled or unsafe?

To determine if your WordPress plugin is compromised or being accessed by a hacker, programming knowledge or expertise in quality assurance or penetration testing is important. If you lack this technical background, consult a penetration tester or quality assurance professional for guidance.

What steps should I take if I discover a nulled plugin on my site?

If you discover a plugin on your WordPress website that poses a threat, patch it immediately. Contact the official company, obtain the latest version, and install it. Installing versions from other online sources can still be risky.

Which specific vulnerabilities were found in the mentioned plugin?

All these nullified plugins, which can be highly vulnerable to vulnerabilities, invite a variety of vulnerabilities. including cross-site scripting, SQL injection, API broken authentication backdoors, object-level injections, JWT leakage, source code leakage, etc.

Where can I find a list of safe plugin repositories?

The best and most advised method for installing a secure WordPress plugin is to do so straight from the WordPress plugin store.

Are there automated tools or plugins that help detect nulled or compromised plugins?

There are multiple plugins available in the market for preventing external and internal attacks. However, these plugins often work with the techniques, but sometimes they do not. The best practice is to identify the potential vulnerabilities in the plugin by hiring a professional team that can help you identify vulnerabilities in your architecture.

more insights

Elementor #1043

Elementor #1043 April 2, 2026 | by imran Niaz Read More → Recovering a hacked website with some easy practices

Read more >
Scroll to Top