Analysis

The WordPress CMS isn't insecure – you are!

Another vulnerability in WordPress is bad news for the CMS platform

WordPress

The latest in a long line of headlines has highlighted yet another WordPress flaw this time a million sites have been put at risk by a vulnerability introduced by another poorly coded plugin, with an analytics tool using a stupidly guessable secret key. 

As a result, warnings have been flying around about how insecure WordPress is and how it's time to get real and move into a more secure Content Management System. The only getting real that needs to be done is in the mindset of those who are way to quick to blame WordPress and way too slow to look in the mirror where the true responsibility may well be reflected.

WordPress does a pretty decent job of being secure out of the box. That is, when it's used in a properly configured and up-to-date default installation without third-party code. Hopefully we can all agree on that, and also agree that adding third-party code or plugins doesn't automatically equate to a huge hole being driven through your organisation's defences. That said - and I've said it before and I make no bones for saying it again - WordPress itself is not insecure, but the plugins that you choose to use with it may be. 

According to Stephen Coty, chief security evangelist at Alert Logic, WordPress has "always done a very poor job of scanning plugins that the community creates and uploads" which means a malicious actor might create a functional and popular plugin with a backdoor that goes unnoticed.

And that's seen with other companies. Apple operates a walled garden when it comes to the iOS apps people can use, whereas Google maintains a hands-off approach to the Android App Store. Unsurprisingly there have been plenty of cases of malicious Android apps, and relatively few iOS ones. 

However, that changes nothing. Given that most of the WordPress plugins that are problematical employ pretty basic security getarounds, and given that most WordPress sites are run on easily hardened LAMP stacks for enterprise usage, it's something of a brain-squeezer that we are talking about it at all. 

Here's the bottom line: if you were to apply the same level of due diligence regarding security to plugins as you likely did when considering which CMS platform you were going to use, then your business would be much more secure as a result. The same holds true for applying updates: you need to run updates for the WordPress platform as well as any patches, themes or plugins you've installed.

Security is your responsibility it's time to take it into your own hands.

Featured Resources

Choosing a collaboration platform

Eight questions every IT leader should ask

Download now

Performance benchmark: PostgreSQL/ MongoDB

Helping developers choose a database

Download now

Customer service vs. customer experience

Three-step guide to modern customer experience

Download now

Taking a proactive approach to cyber security

A complete guide to penetration testing

Download now

Recommended

Mastering endpoint security implementation
Security

Mastering endpoint security implementation

16 Apr 2021
US, UK say Russia was behind SolarWinds hack
cyber attacks

US, UK say Russia was behind SolarWinds hack

16 Apr 2021
1Password targets enterprise customers with Secrets Automation
IT infrastructure

1Password targets enterprise customers with Secrets Automation

14 Apr 2021
PowerShell threats increased over 200% last year
cyber security

PowerShell threats increased over 200% last year

14 Apr 2021

Most Popular

Microsoft is submerging servers in boiling liquid to prevent Teams outages
data centres

Microsoft is submerging servers in boiling liquid to prevent Teams outages

7 Apr 2021
How to find RAM speed, size and type
Laptops

How to find RAM speed, size and type

8 Apr 2021
Roadmap 2021: What’s coming from 3CX
Advertisement Feature

Roadmap 2021: What’s coming from 3CX

30 Mar 2021