IT Pro is supported by its audience. When you purchase through links on our site, we may earn an affiliate commission. Learn more

Opt out of plugging in for a more secure CMS

Davey Winder explains why CMS plug-ins are not worth the security risk

The web, as we know it today, relies heavily on content management systems (CMS) to operate.

It's a CMS that allows a blog, news publication or shopping site to be managed centrally, collaboratively and consistently, which is why it's such a shame that CMS systems suck elephants through a straw when it comes to security. Actually, let me qualify that statement: CMS plugins suck.

So much so, I know web developers at the larger end of the business who visibly shudder when a client asks for a plugin to be installed.

It's not just the home-brew business sites, participating in the perilous 'free plugin' adventure I am talking about here. Commercial plugins, which you might expect to be a different container of aquatic creature are also vulnerable.

I was talking to someone the other day who had been using a 'premium' plugin called the 'revolution slider' in this case. Now here's the thing, the plugin vulnerability was quickly patched by the developers for anyone who was buying it through them. However, older versions were still out there and rolled into theme packages and those are less likely to have been patched.

As a result, one business found itself on the wrong end of an exploit. The attacker downloaded the wp-config.php file and gained access to database credentials using this Local File Inclusion (LFI) attack mode. The outcome was a hijacked mail server, pumping out hundreds of thousands of malicious emails, and a reputation requiring urgent rebuilding.

It comes as no surprise in that example that it was the WordPress CMS at the heart of things, including the insecurity issues.

WordPress is popular for a reason, well many reasons, and they all revolve around it being very functional indeed.

Security outfit Imperva reckon that 74,652,825 sites depend on Wordpress, including the likes of CNN, eBay and The New York Times. Half of those are using the free hosting supplied by, just to add a little more fear to the pot.

Of the top 100 blogs listed by Technorati, 48 per cent use WordPress. Unfortunately, as revealed in the annual 'Web Application Attack Report' from the same security vendor, sites running WordPress turn out to have been attacked 24.1 per cent more often than sites running on all the other CMS platforms combined and they get hit by Cross Site Scripting (XSS) attacks 60 per cent more frequently.

Here's the thing, and the message I'm trying to get across: the CMS itself is not a liability, and WordPress is not a liability. Plugins, on the other hand really can be, more often than not.

Saying be careful is a bit twee, but I'll say it anyway. When it comes to choosing plugins, my rule of thumb would be to apply the same level of security due diligence as you did when choosing which CMS platform to use in the first place.

Featured Resources

The Total Economic Impact™ Of Turbonomic Application Resource Management for IBM Cloud® Paks

Business benefits and cost savings enabled by IBM Turbonomic Application Resource Management

Free Download

The Total Economic Impact™ of IBM Watson Assistant

Cost savings and business benefits enabled by Watson Assistant

Free Download

The field guide to application modernisation

Moving forward with your enterprise application portfolio

Free Download

AI for customer service

Discover the industry-leading AI platform that customers and employees want to use

Free Download

Most Popular

Why convenience is the biggest threat to your security

Why convenience is the biggest threat to your security

8 Aug 2022
How to boot Windows 11 in Safe Mode
Microsoft Windows

How to boot Windows 11 in Safe Mode

29 Jul 2022
UK water supplier confirms hack by Cl0p ransomware gang

UK water supplier confirms hack by Cl0p ransomware gang

16 Aug 2022