Salta al contenuto principale


It’s Not WordPress. It’s the Plugins.


After managing hundreds of WordPress sites over the years, one thing is clear: the core is solid – it’s the outdated, poorly written plugins that open the doors to attacks. At OSDay 2025, I attended a talk that confirmed this and shed light on a massive b
in reply to Stefano Marinelli

@stefano@bsd.cafe When I took over operating a corporate WordPress install one of the first things I did was IP-limit access to wp-admin/ resources (there’s a few you have to allow-all for, or were back then) as a blanket mitigation for that kind of vulnerability. Not a complete defence, but it felt like a good start.

I’ve done similar for my snac instance - not that I think the code is insecure, but if you can’t reach the admin URL you can’t even try to credential-stuff it :)

Questa voce è stata modificata (5 mesi fa)
in reply to Stefano Marinelli

OMG This.

WordPress is groovy. FULL STOP
As a CMS it work flawlessly. You wanna do something interesting now you're in PluginHell.

I host a lot of WordPress too. I try not to butch because something something, food on my table something ...
I hate plugin authors.

And WP plugin code is an orgy of stupid.

The worst code I read in a day is a WordPress plugin. Guaranteed.

in reply to Stefano Marinelli

While I do maintain Linux servers at work, I don’t maintain their Wordpress instance. I am however *using* it: I am part of a team which sometimes posts internal messages to a corporate-internal Wordpress blog which employees rely on to keep track of certain important events.

I totally agree about the plugins. In fact, we installed a plugin which itself is a plugin maintenance tool, a way to notify ourselves whether plugin X or Y have vulnerabilities, basically.

Questo sito web utilizza cookie tecnici e di sessione. Proseguendo la navigazione su questo sito, accetti l'utilizzo dei cookie.