Security

16   Articles
16

All things Internet security

4 Min Read
0 11

The WordPress API has a huge learning curve, so you might miss authentication and authorization checks when you code your first plugin. This article will explain how an authentication failure…

Continue Reading
4 Min Read
0 20

The WordPress plugin All-In-One Sticky Floating Contact Form was found to have a vulnerability involving authorization bypasses. When you develop plugins for WordPress, it’s important to ensure that the user…

Continue Reading
4 Min Read
0 33

Every input sent in a server request should be inspected, sanitized, and validated before processing it in your code. WordPress plugins are great for adding features to your site for…

Continue Reading
3 Min Read
0 30

The CSV-to-SortTable WordPress plugin is a handy little tool for site owners, but its codebase shows that it was not built with hackers in mind. CSV-to-SortTable does not validate files…

Continue Reading