Security Weekly

Why You Should Avoid Abandoned WordPress Plugins

Cleanshot 2023 11 30 At 14.14.30

Published:

Cleanshot 2023 11 30 At 14.14.30

Oliver Sild

Patchstack

Oliver Sild is the CEO and Co-founder of Patchstack. He is an entrepreneur and cyber security expert with a strong focus on community building. He has been organising hacking competitions (& local CTF community) in Estonia since 2016, has kickstarted a startup community in his hometown and has nearly 10 years of experience with WordPress security.

Week 20

Something that has been coming up a lot lately is the issue of abandoned WordPress plugins and themes. Since around 30% of security vulnerabilities reported in plugins won’t get patched, people have been reaching out to Patchstack for help.

It’s a tough situation. The options are limited – you can either hardcode a fix by yourself, delete the plugin from the website or risk the security of your website and hope that the developer becomes active again.

The best approach to this problem is to try avoid such situations before they happen. Luckily, it’s something that is quite easy to avoid and only takes few minutes of due diligence everyone should do before installing a new plugin to their website.

Why are abandoned plugins dangerous?

Abandoned projects are essentially a ticking bomb. While they might be still working as intended, the compatibility and security issues are creeping behind the corner. Once a security or compatibility issue has been found, you’re essentially left alone with nobody to address it.

Making matters worse, hackers are known to target projects that are on the brink of becoming abandoned. The recent XZ utils backdoor is a great example. The original developer was struggling to keep the project updated and someone with a malicious intent offered help. Once gaining control over the project, the hacker injected a hidden backdoor into the project.

This is a great example why it’s important to keep an eye on how the developer is doing. In fact – we could even say that supporting the developers of the open source projects you’re using contribute directly to the security of your application.

Make sure the developer is known and active

Take a look at who is behind the plugin or a theme you’re looking to install. Is the company/person behind the plugin disclosed in a transparent way? Is there a simple way to reach out to them?

If the plugin is hosted at WordPress plugin repository, take a quick look at the details and see when was the project last updated. This gives a good indication of whether the it’s in active development.

Next up, open up the “Support” page and see if the developer is engaged with the users and is answering questions. Keep in mind that some projects have their main support channel elsewhere (such as live chat on website), so if the WordPress plugin repository support page is empty, try to validate if their support exists elsewhere (and if it’s responsive).

Look at the frequency of past updates

Take a look the frequency of past updates. In the WordPress plugin repository, navigate to the “Development” page and click on the “Development log”. This will show you the dates of all previous updates.

If a project has received a recent update, but has not been updated for a year before that – this could indicate that the project has not been a priority for the developer or the project could have even changed its ownership. The latter is very important to double check, so you know who the new owner is.

Look at the history of known security issues

The most common reason how people find out that the plugin they are using is abandoned is after a security vulnerability has been left unfixed. In many of those cases, WordPress plugin repository also closes the plugin, to avoid people from downloading it (unfortunately, affected users are not being notified).

Security fixes should be prioritised by the developers, as they often require immediate attention. It’s the ultimate test to see how responsive a developer is, so in case the project has any known CVE’s – take a look at how much time it took for them to release a fixed version.

The best sign is when the vulnerability is being disclosed on the exact same day when a patched version is released. This shows that the developer is a) responsive and deals with the security issues as priority b) that the developer is coordinating the vulnerability disclosure with the reporter.

Bonus tip: Take a look if the project change-log also describes the security fix and if the developer released a blog post or sent out any public communication. Some developers unfortunately try to hide such information which can result with some of the users not knowing to prioritise it as a security update. This actually becomes illegal by law in coming years.

Conclusion

The best way to reduce risk that may come from abandoned projects, is to prevent using such in the first place. You can also do your part by supporting the developers of the projects you’re using. The security of the open source ecosystem really is in our hands.

Some additional resources:

Join the Conversation!

There's a dedicated thread on this post inside of The Admin Bar community. Join in on the conversation, ask questions, and learn more!

Group Thread
Cleanshot 2023 11 30 At 14.14.30

Oliver Sild

Patchstack

Oliver Sild is the CEO and Co-founder of Patchstack. He is an entrepreneur and cyber security expert with a strong focus on community building. He has been organising hacking competitions (& local CTF community) in Estonia since 2016, has kickstarted a startup community in his hometown and has nearly 10 years of experience with WordPress security.

Brought to you by:
Logo

Patchstack auto-mitigates security vulnerabilities found on WordPress core, plugins and themes. Patchstack is the leading vulnerability intelligence provider in the entire WordPress ecosystem and has the largest collection of vulnerability specific vPatch rules that provide precision protection without any performance hit nor false positives. Patchstack is the go-to security provider for many of the leading agencies such as 10up, Valet, SiteCare and others.

Never Miss an Issue!

Subscribe and have Security Weekly delivered to your inbox every week!

Care Plan Toolkit

Save time, boost profits, and confidently manage client websites with proven tools, tips, and resources.

Bento Toolkit

More from Security Weekly

Week 47

Why Use Virtual Patching for WordPress Security?

Virtual patching is a security strategy that involves applying protective measures to the WordPress application without …

Week 46

What Role Does AI Play in WordPress Security?

We can’t ignore the power of LLMs and AI when it comes to security. At Patchstack, …

Week 45

Where to get your WordPress plugins and themes?

As of writing this article, it’s a hot topic. Some plugins which have been available on …