20% Off My Easy-Peasy Proposal with the Coupon Code 20OFF (Now - April 30th)

Security Weekly

WordPress Security on Application Layer

Cleanshot 2023 11 30 At 14.14.30


Cleanshot 2023 11 30 At 14.14.30

Oliver Sild


Oliver Sild is the CEO and Co-founder of Patchstack. He is an entrepreneur and cyber security expert with a strong focus on community building. He has been organising hacking competitions (& local CTF community) in Estonia since 2016, has kickstarted a startup community in his hometown and has nearly 10 years of experience with WordPress security.

Week 9

Once you have your server ready, you’ll need to set up the application that you wish to host there. This application in our case is the WordPress and all of the different plugins, themes and custom code you add to it.

The decisions you make here have the biggest impact to the overall security of your WordPress site. In fact, majority of the WordPress hacking incidents happen because something in this layer failed.

What to focus on at the application?

The biggest difference between WordPress websites that either “make or break” the security boils down to the installed software stack. WordPress core itself is actually very secure, it’s been around for 20+ years and thousands of developers and security experts have gone over the codebase.

The same can’t be said about most of the plugins & themes that you install to your WordPress applications. The more popular the plugin is, the more developers have looked at its code, but since plugin development happens in a more closed manner (compared to core), then most of them are built by just a few (or even just one) developers.

WordPress is a content management system, so it’s built for people to make it easier to manage content. And as soon as people get involved, you’re opening the pandoras box of access management.

Choosing the right WordPress stack

One of the most important decisions you need to make is what plugins to use for a specific WordPress site. Even when it’s just about adding a simple form to your site, you have dozens of different plugins to choose from.

I would highly recommend to choose your stack based on:

  1. Functionality: Every plugin you add adds weight. Plugins that drift away from their intended functionality often become bloated. Bloat is bad for the performance and often adds complexity which can introduce unexpected vulnerabilities.
  2. Code quality: Code that is well maintained and documented is less likely to include bugs and security vulnerabilities. The code should follow the WordPress codex, have clear licensing and not rely on too much on third-party code.
  3. Security practices: Plugins should have a security point of contact and should release security patches without delay. Clear communication is equally important, so the users would know to update.
  4. Reputation: It’s important to choose a plugin that is built by a trusted developer. Great developers are active and support their users. You don’t want to end up relying on a plugin that gets abandoned by its developer.

Try to stick with the same stack on different websites you build. Use only the ones you really need and keep the overall number of installed plugins/themes as low as possible. Make sure you’re also subscribed to each of the plugins official communications.

Maintenance and vulnerability monitoring

WordPress core and every plugin/theme needs maintenance. Developers release new versions that include new features, bug fixes and security updates. Sometimes, updates are also needed to stay compatible with the new WordPress core updates.

If you’ve selected your plugins based on the criteria’s listed above, then you should be able to worry less about breaking changes and have better insights into which updates can wait, and which ones need to be prioritised ASAP.

The most important thing to watch out for are security updates. Unfortunately, not all plugin developers are transparent with security fixes, so using a third-party vulnerability monitoring solution can really save your day.

Vulnerability management and mitigation

Even if you’ve turned on auto-updates or turned on auto-updates only when security fixes have detected in a new version (you can do that with Patchstack), then you still need to keep in mind that ~30% of published vulnerabilities don’t receive fixes in time.

Security vulnerabilities in plugins can become mass-exploited in a matter of hours. If you don’t update to a fixed version before that or if a fixed version is not released by the developer at all, then chances are that your website will get compromised.

To reduce such risk, you can get help from security services that create vulnerability specific virtual patches, that can be activated on a website automatically without any code changes or disruption and can instantly mitigate the vulnerability.

Access management

Not every user on the site needs administrator rights. Administrator accounts should also not be used on a daily basis for content management. Unfortunately, we see that admin accounts are being used all of the time.

If possible, developers should avoid giving admin accounts to the users of the website. In most cases, Author role is more than enough for people who work on the website content. If there’s more than one person who might collaborate on same content, then you can assign Editor roles.

If you have not noticed yet, it’s also a year 2024 already, so if you’re still not enforcing 2FA on all privileged accounts (anything contributor or higher), then you should go and do that immediately. I personally hope that this year we’ll finally see 2FA being introduced into the WordPress core.

If you want to secure your access management, look into Fortress that covers with 2FA, session protection, password security and login protection. You can also look into Solid Security for that (they have been advocating passkeys, which is great).

It’s also a really good practice to log out of your account when you’re done, and ask (or enforce) others to do the same.


If you look at the amount of code that makes a WordPress applications run, then in many cases WordPress itself is the smallest part of it. WordPress is popular for the endless possibility for customisation. But this is also what can make it the most vulnerable.

Choose your stack wisely, don’t slack on maintenance and make sure you’re not left in dark when it comes to security vulnerabilities. Don’t rely only on the plugin developers either – take security on your hands by making sure the vulnerabilities get mitigated (virtual patched) as soon as they are published.

WordPress is for content management and different people may be working on the content over the years. Avoid giving out admin accounts and make sure old accounts are deleted. If you’re not already using 2FA yet, then set it up now.


Join the Conversation!

There's a dedicated thread on this post inside of The Admin Bar community. Join in on the conversation, ask questions, and learn more!

Group Thread
Cleanshot 2023 11 30 At 14.14.30

Oliver Sild


Oliver Sild is the CEO and Co-founder of Patchstack. He is an entrepreneur and cyber security expert with a strong focus on community building. He has been organising hacking competitions (& local CTF community) in Estonia since 2016, has kickstarted a startup community in his hometown and has nearly 10 years of experience with WordPress security.

Brought to you by:

Patchstack auto-mitigates security vulnerabilities found on WordPress core, plugins and themes. Patchstack is the leading vulnerability intelligence provider in the entire WordPress ecosystem and has the largest collection of vulnerability specific vPatch rules that provide precision protection without any performance hit nor false positives. Patchstack is the go-to security provider for many of the leading agencies such as 10up, Valet, SiteCare and others.

Never Miss an Issue!

Subscribe and have Security Weekly delivered to your inbox every week!

Come Join Us!

Join the #1 WordPress Community and dive into conversations covering every aspect of running an agency!

Kyle Van Deusen

Community Manager

More from Security Weekly

Week 16

Supply Chain Security Risks in WordPress Plugins

In March 2024, WordPress 6.5 introduced a feature called plugin dependencies. As you may know, there …

Week 15

Most Dangerous Vulnerabilities in WordPress Plugins

As we recently published the annual Patchstack report about WordPress security (and also covered it in …

Week 14

State of WordPress Security – 2024 Report

This week is a little different. In the beginning of each year, we take a look …