In the plugin security best practices tutorial we covered the 5 top ways you can ensure your plugin is developed securely. However, it's important to understand why you need to follow these principles.
In this tutorial, we will cover the top 3 Common Vulnerabilities that are found in plugins, and how to use the practices taught in the previous tutorial to combat them.
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Extending WordPress: common security vulnerabilities
1. Confidential Customized for Lorem Ipsum LLC Version 1.0
Jonathan Bossenger
Extending WordPress:
Common security vulnerabilities
Learn.WordPress.org
2. Confidential Customized for Lorem Ipsum LLC Version 1.0
Learn.WordPress.org
What you will learn
1. Common vulnerabilities to consider
2. Examples of how to prevent each type of vulnerability
3. Where to find more information
3. Confidential Customized for Lorem Ipsum LLC Version 1.0
Learn.WordPress.org
5 security principles
1. Sanitizing input
2. Data validation
3. Escaping output
4. Preventing untrusted requests
5. Checking user capabilities
4. Confidential Customized for Lorem Ipsum LLC Version 1.0
Learn.WordPress.org
Common Vulnerabilities
1. SQL Injection - values are not properly sanitized for SQL commands
Notes de l'éditeur
TITLE SLIDE: Make a copy of this presentation to your Google Drive, and edit to replace with your details.
TITLE SLIDE: Make a copy of this presentation to your Google Drive, and edit to replace with your details.
TITLE SLIDE: Make a copy of this presentation to your Google Drive, and edit to replace with your details.
TITLE SLIDE: Make a copy of this presentation to your Google Drive, and edit to replace with your details.