{"id":7710,"date":"2024-04-15T15:48:36","date_gmt":"2024-04-15T13:48:36","guid":{"rendered":"https:\/\/f.technology\/blog\/wordpress-en\/why-are-plugin-theme-and-wordpress-core-vulnerabilities-dangerous\/"},"modified":"2024-10-07T11:35:46","modified_gmt":"2024-10-07T09:35:46","slug":"why-are-plugin-theme-and-wordpress-core-vulnerabilities-dangerous","status":"publish","type":"post","link":"https:\/\/f.technology\/en\/blog\/cyber-security-en\/why-are-plugin-theme-and-wordpress-core-vulnerabilities-dangerous\/","title":{"rendered":"Why are plugin, theme and WordPress Core vulnerabilities dangerous?"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"7710\" class=\"elementor elementor-7710 elementor-5637\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6de6029 e-flex e-con-boxed e-con e-parent\" data-id=\"6de6029\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5ca3ccf elementor-widget elementor-widget-text-editor\" data-id=\"5ca3ccf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>WordPress<\/strong> is by far <a title=\"kinsta wordpress most used in the world\" href=\"https:\/\/kinsta.com\/it\/quota-di-mercato-di-wordpress\/\" target=\"_blank\" rel=\"noopener nofollow\">the most popular content management system (CMS).<\/a><br \/>\nWorldwide, more than 40 percent of all websites are based on WordPress.<br \/>\nHowever, this popularity also has its downsides: it makes the CMS an attractive target for <strong><a title=\"kinsta wordpress hacked\" href=\"https:\/\/kinsta.com\/it\/blog\/wordpress-hacked\/\" target=\"_blank\" rel=\"noopener nofollow\">cyber attacks<\/a><\/strong>.   In addition, the great strengths of WordPress (its flexibility and modular structure) mean that this CMS tends to be insecure if you <span style=\"text-decoration: underline;\">abandon<\/span> it without applying concrete and effective security measures such as <strong>constant monitoring of<\/strong> newly discovered <strong> <a title=\"wordpress vulnerability\" href=\"https:\/\/f.technology\/en\/category\/vulnerabilita-en\/\" rel=\"nofollow\">vulnerabilities<\/a><\/strong>,<strong>updating<\/strong> with <strong>theme<\/strong>, <strong>plugin<\/strong> and <strong>WordPress core<\/strong> patches, use of <strong><a title=\"wpremote security\" href=\"https:\/\/wpremote.com\/features\/wordpress-security\/\" target=\"_blank\" rel=\"noopener nofollow\">firewalls<\/a><\/strong> and spam filters, the <strong><a title=\"kinsta php 8.1\" href=\"https:\/\/f.technology\/en\/blog\/hosting-en\/mandatory-upgrade-to-php-8-1-on-kinsta\/\" rel=\"nofollow\">reviewing the version of PHP<\/a><\/strong> installed on your server or the use of advanced <strong>HTTP Security Headers<\/strong> (<span style=\"text-decoration: underline;\"><a title=\"http security headers guide\" href=\"https:\/\/f.technology\/blog\/cyber-security\/aumentare-sicurezza-con-http-security-headers\/\" rel=\"nofollow\">read our guide here!<\/a><\/span>).<\/p>\n<p>Above all, rely on a reliable certified WordPress hosting service that guarantees you prompt and qualified support service: <a title=\"why choose kinsta\" href=\"https:\/\/f.technology\/blog\/hosting\/perche-scegliere-kinsta\/\" rel=\"nofollow\">we rely on Kinsta, try it!<\/a><\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-57fe61e elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"57fe61e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-90f7d2a elementor-widget elementor-widget-heading\" data-id=\"90f7d2a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">How are WordPress sites hacked?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8988a2f elementor-widget elementor-widget-text-editor\" data-id=\"8988a2f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tWithout opening a detailed and technical chapter on the types of hacks, breach means mainly:  <ul>\n \t<li><strong>Access to<\/strong> site<strong>administration<\/strong> by unauthorized person or bots.<\/li>\n \t<li><strong>Damage<\/strong> to one or more parts of the site, such as deleting images or changing text.<\/li>\n \t<li><strong>Malicious use of<\/strong> the site, e.g., to <strong>send spam<\/strong>, make <strong>banned material<\/strong> visible that could lead to <strong>banning of your domain<\/strong> or <strong>theft of information from the database!<\/strong><\/li>\n<\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div data-dce-advanced-background-color=\"#F5F5F5\" class=\"elementor-element elementor-element-7b40aac elementor-widget elementor-widget-heading\" data-id=\"7b40aac\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Prevention is key; restoring a breached site takes much longer<br>than securing it.<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2e3758d elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"2e3758d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2672582 elementor-widget elementor-widget-image\" data-id=\"2672582\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"745\" height=\"385\" src=\"https:\/\/f.technology\/wp-content\/uploads\/2024\/04\/wordpress-core-update.png\" class=\"attachment-medium_large size-medium_large wp-image-7834\" alt=\"\" srcset=\"https:\/\/f.technology\/wp-content\/uploads\/2024\/04\/wordpress-core-update.png 745w, https:\/\/f.technology\/wp-content\/uploads\/2024\/04\/wordpress-core-update-300x155.png 300w\" sizes=\"(max-width: 745px) 100vw, 745px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5a54672 elementor-widget elementor-widget-heading\" data-id=\"5a54672\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">First, update the WordPress core...<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c89a243 elementor-widget elementor-widget-text-editor\" data-id=\"c89a243\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Among all the hacked WordPress sites, <a title=\"sucuri hacked report\" href=\"https:\/\/blog.sucuri.net\/2018\/04\/hacked-website-trend-report-2017.html\" target=\"_blank\" rel=\"noopener nofollow\">Sucuri<\/a> found that 39.3 percent of them were running <strong>outdated WordPress core software<\/strong> at the time of the incident.<\/p>\n<p>Fortunately, the WordPress security team <strong>continuously checks the<\/strong> platform <strong>code<\/strong> for critical vulnerabilities, and these are fixed immediately as soon as they are discovered.<br \/>\nWordPress developers generally work very reliably and quickly, especially when it comes to critical errors.<br \/>\nOnly a fraction of all WordPress security vulnerabilities are therefore due to errors in the core.<br \/>\nSo if you always work with the<strong>latest version of WordPress<\/strong> and <strong>update<\/strong> it in a timely manner, <span style=\"text-decoration: underline;\">you can protect yourself quite reliably from hackers exploiting security vulnerabilities in outdated versions of WordPress.<\/span>   <\/p>\n<p>Be careful if you want to upgrade your WordPress yourself, better prepare a backup first!<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4d2d9b8 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"4d2d9b8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8382a3a elementor-widget elementor-widget-image\" data-id=\"8382a3a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"768\" height=\"462\" src=\"https:\/\/f.technology\/wp-content\/uploads\/2024\/04\/siti-violati-wordpress-768x462.png\" class=\"attachment-medium_large size-medium_large wp-image-7835\" alt=\"\" srcset=\"https:\/\/f.technology\/wp-content\/uploads\/2024\/04\/siti-violati-wordpress-768x462.png 768w, https:\/\/f.technology\/wp-content\/uploads\/2024\/04\/siti-violati-wordpress-300x181.png 300w, https:\/\/f.technology\/wp-content\/uploads\/2024\/04\/siti-violati-wordpress.png 1005w\" sizes=\"(max-width: 768px) 100vw, 768px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-48c1193 elementor-widget elementor-widget-heading\" data-id=\"48c1193\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Are there vulnerabilities among your plugins or in your theme?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-04db40b elementor-widget elementor-widget-text-editor\" data-id=\"04db40b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>In a <a title=\"Wordfence survey compromised sites\" href=\"https:\/\/www.wordfence.com\/blog\/2016\/03\/attackers-gain-access-wordpress-sites\/\" target=\"_blank\" rel=\"noopener nofollow\">Wordfence survey<\/a> of owners of compromised websites, more than 60 percent of those who knew how the hacker got into the site attributed the incident to a theme or plugin vulnerability, and similarly, in Sucuri&#8217;s 2016 report, just 3 plugins were the cause of more than 15 percent of the breaches that were recorded<em>(do you know the continuing vulnerabilities of the well-known Elementor composer, the Avada and Hello theme, or the Woocommerce plugin?<\/em>).<\/p>\n<p>All the vulnerabilities in these plugins, at the time of the hack, <strong>had long since been fixed<\/strong> by the developers, but the site owners <strong>had not yet updated<\/strong> leaving themselves exposed to the threat!<\/p>\n<p>Therefore, it is important to constantly update your plugins and rely on certified hosting that notifies you of known threats among plugins and themes, or use monitoring services such as <strong>WP Remote<\/strong><a title=\"WP-Help\" href=\"https:\/\/f.technology\/en\/wordpress\/wp-help\/\" target=\"_blank\" rel=\"noopener nofollow\">(all websites under WP-Help maintenance contract are protected on this platform<\/a>).<\/p>\n<p>Take a look at<a title=\"Pathstack vulnerability archive\" href=\"https:\/\/patchstack.com\/database\/\" target=\"_blank\" rel=\"noopener nofollow\">Pathstack&#8217;s<\/a> constantly updated vulnerability<a title=\"Pathstack vulnerability archive\" href=\"https:\/\/patchstack.com\/database\/\" target=\"_blank\" rel=\"noopener nofollow\">archive<\/a> to realize how WordPress plugin vulnerabilities are not to be underestimated (warning, contains technicalities!).<br \/>\nIt&#8217;s also a good strategy, when choosing a plugin or theme, to also consider the frequency of updates and how closely they are followed by their developers!<br \/>\nBest to avoid outdated and underused tools.  <\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0bd3f07 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"0bd3f07\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2cf1d68 elementor-widget elementor-widget-heading\" data-id=\"2cf1d68\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Updates on your own: tips<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fced27f elementor-widget elementor-widget-text-editor\" data-id=\"fced27f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Often sites do not give problems after a plugin update, but when it comes to <strong>major releases<\/strong> (e.g., 1.5.6 to 2.0.0) or particularly important tools, it is possible that frontends will find unintended changes or some features no longer operate.<br \/>\nIn the worst cases, <strong>fatal errors<\/strong> can be generated that render the <strong>site unusable<\/strong>. <\/p>\n<p>Ecci some best practices in this regard:<\/p>\n<ul>\n<li>The best way to prepare for an update is to <strong>test the changes in a <a title=\"Kinsta staging\" href=\"https:\/\/kinsta.com\/docs\/wordpress-hosting\/staging-environment\/\" target=\"_blank\" rel=\"noopener nofollow\">staging environment<\/a><\/strong>, updating the site in production only when you are certain it will work properly.<\/li>\n<li>If updating the plugin while staging shows anomalies, you can isolate the problem by analyzing the <strong>server logs<\/strong>.<\/li>\n<li>Sometimes an update may make the plugin <strong>incompatible<\/strong> with other tools: in these cases it may also come in handy to act by exclusion (disabling plugins or changing the theme).<\/li>\n<li>If provided, it may be useful to contact the<strong>plugin&#8217;s support<\/strong>.<br \/>\nThis does not exclude the fact that sometimes it may be necessary to <strong>replace<\/strong> the plugin. <\/li>\n<li>It is always advisable to make a <strong>backup copy<\/strong> before upgrading so that it can be restored if necessary.<\/li>\n<\/ul>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0c10573 e-flex e-con-boxed e-con e-child\" data-id=\"0c10573\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-b94c7b4 e-flex e-con-boxed e-con e-child\" data-id=\"b94c7b4\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5da137d elementor-widget elementor-widget-heading\" data-id=\"5da137d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Is your site secure?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-03666fc elementor-widget elementor-widget-text-editor\" data-id=\"03666fc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Request a free analysis from our specialized WordPress technicians-they are ready to secure your site!<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a445b5f e-flex e-con-boxed e-con e-child\" data-id=\"a445b5f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ba380c3 elementor-widget elementor-widget-button\" data-id=\"ba380c3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-lg\" href=\"mailto:support@f.technology\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-long-arrow-alt-right\"><\/i>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Open a support ticket<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>WordPress is by far the most popular content management system (CMS). Worldwide, more than 40 percent of all websites are based on WordPress. However, this popularity also has its downsides: it makes the CMS an attractive target for cyber attacks. In addition, the great strengths of WordPress (its flexibility and modular structure) mean that this [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":7833,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[71,78],"tags":[],"class_list":["post-7710","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security-en","category-wordpress-en"],"acf":[],"_links":{"self":[{"href":"https:\/\/f.technology\/en\/wp-json\/wp\/v2\/posts\/7710","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/f.technology\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/f.technology\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/f.technology\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/f.technology\/en\/wp-json\/wp\/v2\/comments?post=7710"}],"version-history":[{"count":1,"href":"https:\/\/f.technology\/en\/wp-json\/wp\/v2\/posts\/7710\/revisions"}],"predecessor-version":[{"id":7712,"href":"https:\/\/f.technology\/en\/wp-json\/wp\/v2\/posts\/7710\/revisions\/7712"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/f.technology\/en\/wp-json\/wp\/v2\/media\/7833"}],"wp:attachment":[{"href":"https:\/\/f.technology\/en\/wp-json\/wp\/v2\/media?parent=7710"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/f.technology\/en\/wp-json\/wp\/v2\/categories?post=7710"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/f.technology\/en\/wp-json\/wp\/v2\/tags?post=7710"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}<!-- This website is optimized by Airlift. Learn more: https://airlift.net. Template:. Learn more: https://airlift.net. Template: 6a0d0da2d36f738f1f67cd30. Config Timestamp: 2026-05-20 01:25:53 UTC, Cached Timestamp: 2026-05-20 19:14:35 UTC -->