Support

Admin Tools

#42879 Super User monitoring and blocking vulnerabilities from compromised update servers

Posted in ‘Admin Tools for Joomla! 4 & 5’
This is a public ticket

Everybody will be able to see its contents. Do not include usernames, passwords or any other sensitive information.

Environment Information

Joomla! version
n/a
PHP version
n/a
Admin Tools version
n/a

Latest post by nicholas on Monday, 13 April 2026 07:43 CDT

komir

Hello I am writing to you regarding a security email alert I received from Admin Tools on one of my sites. The system successfully detected and blocked a suspicious Super User account creation.

After investigation, I found that the site was compromised through a vulnerability on the update server of the "Nextendweb" (Smart Slider) extension. Unfortunately, several of my other sites were also affected by the same issue, but I did not receive any notifications from Admin Tools on those sites.

I have two questions:

  1. Enabling the feature: How can I ensure that this specific "Super User monitoring" function is enabled on all my other sites? Is there a specific setting in the WAF configuration I should check to make sure I am notified on every site?

  2. Prevention: Is there a way within Admin Tools to block such intrusions if an extension's update server is compromised? Since the malicious code comes through a "legitimate" update process, can Admin Tools prevent the execution of such unauthorized user creations, or is this type of attack impossible to block entirely at the extension level?

Thank you for your assistance

Best regards

4M CAD profesionalni CAD alat

nicholas
Akeeba Staff
Manager

Enabling the feature: How can I ensure that this specific "Super User monitoring" function is enabled on all my other sites? Is there a specific setting in the WAF configuration I should check to make sure I am notified on every site?

It is on by default. Go to your site's administrator, Components, Admin Tools for Joomla, Web Application Firewall, Configure WAF, click on the Hardening Options tab and set "Monitor Super User accounts" to Yes. Click on Save.

As a good additional precaution you should use the Password-protect Administrator feature from the main page, or the Administrator Secret URL Parameter feature from the Configure WAF page to add additional authentication controls for anyone wishing to access the admin login page. This way, even if a compromised Super User account exists, the attacker will not be able to access it since they can't get to the login page. This buys you time to fix the issue, like you're doing now.

Is there a way within Admin Tools to block such intrusions if an extension's update server is compromised? Since the malicious code comes through a "legitimate" update process, can Admin Tools prevent the execution of such unauthorized user creations, or is this type of attack impossible to block entirely at the extension level?

No. As you said yourself, if the update server is compromised the attacker doesn't just inject malicious code, they make it appear legitimate. There is no direct defence against that.

This is why features like Super User monitoring exist. I predicted reasoned that an attacker who can run arbitrary code on your site would try to create a Super User account to gain a foothold on your site. Back in 2009 I had an installable ZIP Joomla package file which would create a Super Administrator and remove its tracks; all an attacker needed was 10 seconds of unattended access to the backend as an Administrator (or a compromised update server indeed). The best you can do is catch the fact that there's suddenly a Super User account on the site that wasn't there before and was not created using Joomla's Users page in the backend. This screams "VERY LIKELY COMPROMISED" which is why it's blocked and you get an email.

Also note that the other sites that did not send you an email may not have this feature turned on, their emails might have gone to spam, or they may have not installed the compromised update. According to the published news, the compromised version was quickly replaced with a legitimate one that bumped the version number. A few sites got the infected update, all sites got the fixed update. The sites that didn't notify you may have skipped directly to the fixed update. Do keep in mind that sites do not install updates the same second the updates are published; the installs are spread out over several hours to days, depending on update cache settings, how you install updates etc.

Nicholas K. Dionysopoulos

Lead Developer and Director

🇬🇷Greek: native 🇬🇧English: excellent 🇫🇷French: basic • 🕐 My time zone is Europe / Athens
Please keep in mind my timezone and cultural differences when reading my replies. Thank you!

Support Information

Working hours: We are open Monday to Friday, 9am to 7pm Cyprus timezone (EET / EEST). Support is provided by the same developers writing the software, all of which live in Europe. You can still file tickets outside of our working hours, but we cannot respond to them until we're back at the office.

Support policy: We would like to kindly inform you that when using our support you have already agreed to the Support Policy which is part of our Terms of Service. Thank you for your understanding and for helping us help you!