Opt out of plugging in for a more secure CMS

Davey Winder explains why CMS plug-ins are not worth the security risk

The web, as we know it today, relies heavily on content management systems (CMS) to operate.

It's a CMS that allows a blog, news publication or shopping site to be managed centrally, collaboratively and consistently, which is why it's such a shame that CMS systems suck elephants through a straw when it comes to security. Actually, let me qualify that statement: CMS plugins suck.

So much so, I know web developers at the larger end of the business who visibly shudder when a client asks for a plugin to be installed.

It's not just the home-brew business sites, participating in the perilous 'free plugin' adventure I am talking about here. Commercial plugins, which you might expect to be a different container of aquatic creature are also vulnerable.

Advertisement - Article continues below
Advertisement - Article continues below

I was talking to someone the other day who had been using a 'premium' plugin called the 'revolution slider' in this case. Now here's the thing, the plugin vulnerability was quickly patched by the developers for anyone who was buying it through them. However, older versions were still out there and rolled into theme packages and those are less likely to have been patched.

As a result, one business found itself on the wrong end of an exploit. The attacker downloaded the wp-config.php file and gained access to database credentials using this Local File Inclusion (LFI) attack mode. The outcome was a hijacked mail server, pumping out hundreds of thousands of malicious emails, and a reputation requiring urgent rebuilding.

It comes as no surprise in that example that it was the WordPress CMS at the heart of things, including the insecurity issues.

WordPress is popular for a reason, well many reasons, and they all revolve around it being very functional indeed.

Security outfit Imperva reckon that 74,652,825 sites depend on Wordpress, including the likes of CNN, eBay and The New York Times. Half of those are using the free hosting supplied by, just to add a little more fear to the pot.

Of the top 100 blogs listed by Technorati, 48 per cent use WordPress. Unfortunately, as revealed in the annual 'Web Application Attack Report' from the same security vendor, sites running WordPress turn out to have been attacked 24.1 per cent more often than sites running on all the other CMS platforms combined and they get hit by Cross Site Scripting (XSS) attacks 60 per cent more frequently.

Advertisement - Article continues below

Here's the thing, and the message I'm trying to get across: the CMS itself is not a liability, and WordPress is not a liability. Plugins, on the other hand really can be, more often than not.

Saying be careful is a bit twee, but I'll say it anyway. When it comes to choosing plugins, my rule of thumb would be to apply the same level of security due diligence as you did when choosing which CMS platform to use in the first place.

Featured Resources

What you need to know about migrating to SAP S/4HANA

Factors to assess how and when to begin migration

Download now

Your enterprise cloud solutions guide

Infrastructure designed to meet your company's IT needs for next-generation cloud applications

Download now

Testing for compliance just became easier

How you can use technology to ensure compliance in your organisation

Download now

Best practices for implementing security awareness training

How to develop a security awareness programme that will actually change behaviour

Download now


internet security

Avast and AVG extensions pulled from Chrome

19 Dec 2019

Google confirms Android cameras can be hijacked to spy on you

20 Nov 2019

Most Popular

data governance

Brexit security talks under threat after UK accused of illegally copying Schengen data

10 Jan 2020
cyber security

If not passwords then what?

8 Jan 2020
Policy & legislation

GDPR and Brexit: How will one affect the other?

9 Jan 2020
web browser

What is HTTP error 503 and how do you fix it?

7 Jan 2020