[wp-meta] [Making WordPress.org] #6939: Reporting Security vulnerabilities in plugins
Making WordPress.org
noreply at wordpress.org
Thu Dec 12 08:34:43 UTC 2024
#6939: Reporting Security vulnerabilities in plugins
------------------------------+---------------------
Reporter: dd32 | Owner: (none)
Type: enhancement | Status: new
Priority: normal | Milestone:
Component: Plugin Directory | Resolution:
Keywords: 2nd-opinion |
------------------------------+---------------------
Comment (by oliversild):
Replying to [comment:22 dd32]:
> Regardless; The plugins team should still use the same close-as-security
workflows if the plugin author hasn't resolved a report within a
reasonable timeframe. Simply handing off security reporting to a 3rd-party
reduces the ability for WordPress.org to ensure that only secure plugins
are distributed here.
Making security reporting possible should be the responsibility of the
software author, not .org. That's what has created this problem in the
first place.
> Then we have over a year to get to that point, where plugins can define
their reporting method OR a further iteration of the MVP can provide them
with a way to have it reported via W.org.
It will take time to implement and will also take time for all plugin
developers to adopt this. **We should not wait for the last minute.**
> Agreed. But there is not a current location we can direct all plugins
to, nor can we just have a form that emails the plugins team without some
automation in place.
The correct solution would be that the plugins team should not be bothered
at all by this. In fact, this has been told to us in the past by the reps.
of plugin review team that security reports should be sorted out between
the reporter and the plugin author. Why create a workflow that gravitates
the behaviour in the opposite direction?
> It's not viable for a lot of plugin authors to setup those options, nor
do we want to require them to use one of the very few commercial companies
who are currently in this space.
**This is the only viable way long-term.** Nobody needs to use any kind of
commercial company for that. They will need to establish security point of
contact and it's good enough if they add this information to their readme
file, security.txt file or some dedicated page on their website.
> This is overhead that we already have, due to Security Vendors emailing
us vulnerabilities every day, often that are not user-affecting and where
the plugin author would've been otherwise contactable.
> ...this is about reducing the number of emails that the plugins security
reps have to manually process and respond to every day.
This overhead is directly caused by the fact that plugin developers have
not been enforced to establish a clear security point of contact for the
software they publish. I can say this because we're the largest
vulnerability processor/reporter in the ecosystem and for many plugins
(even the ones which are actively developed) it's often impossible to find
any contact information or a clear way to report security issues - these
are the cases when we fall back to sending the report to the plugin review
team. 1) Plugin review team does not want to deal with this overhead. 2)
Plugin authors don't want a these to be disclosed to third-party (plugin
review team) before they fix the issue 3) We as a reporter should do
everything in our power to keep this between the vulnerability reporter
and plugin author until it gets patched.
**I strongly advise against this MVP that creates a workflow that is a
solution to a consequence and not to a root problem.** To raise the
quality and security of the plugins in the ecosystem, we need the authors
to take more responsibility.
**I propose the following:**
1) - I can draft a guideline for the Plugin Handbook for "Security
Reporting" and how to set up security.txt file and how anyone can set up
their own security reporting without using any third-party commercial
solutions.
2) - Button "Report a vulnerability" next to "Support" button on every
plugin page (will be made visible when a hyperlink is connected to it).
3) - All new plugins submissions need to have this hyperlink present.
4) - Existing plugins should receive an email about this becoming
mandatory starting from 1st of January 2026.
--
Ticket URL: <https://meta.trac.wordpress.org/ticket/6939#comment:23>
Making WordPress.org <https://meta.trac.wordpress.org/>
Making WordPress.org
More information about the wp-meta
mailing list