Codebase Manager
VIP’s Codebase Manager is a service that helps customers keep versions of plugins and themes in their wpcomvip GitHub repository secure and up to date. Codebase Manager’s automated security scanning watches for new vulnerabilities that are published to WPScan.
The WPScan API is leveraged by Codebase Manager to scan a WordPress application’s wpcomvip GitHub repository for known vulnerabilities and available version updates for plugins.
Reports for scan results
Customers can stay informed of known security vulnerabilities that are identified by the scans in several ways:
- The Bot’s Vulnerability and Update Scan: Security vulnerabilities and available version updates for plugin and theme code in pull requests are identified and reported by the VIP Code Analysis Bot.
- VIP Dashboard Plugins panel: Identified security vulnerabilities and available version updates for plugins that are already deployed to application environments are reported in the VIP Dashboard Plugins panel.
- Notifications: Automated messages that are triggered by all levels of identified security vulnerabilities for plugins that are already deployed to application environments. Notifications are opt-in, and can be sent to a webhook URL for Slack, Google Chat, or Microsoft Teams, a general-purpose webhook URL, or an email address.
- Important Alerts: Automated Notifications that are triggered by identified security vulnerabilities rated as high or critical for plugins that are already deployed to application environments. All users with an Org admin role or an App admin role receive Important Alerts by email by default.
WPScan CVSS ratings
Known vulnerabilities are assigned a rating based on the Common Vulnerability Scoring System (CVSS).
None: 0.0
Low: 0.1-3.9
Medium: 4.0-6.9
High: 7.0-8.9
Critical: 9.0-10.0
Preventing false-positive matches
On rare occasions, the naming convention of a plugin or theme directory can cause Codebase Manager to identify a false positive match. A false positive can occur when the directory name for a custom plugin or theme—or third-party plugin or theme from a different source—is identical or similar to the directory name of a WordPress.org plugin or theme.
To prevent false-positive matches, customers should:
- Verify that the (WordPress.org) plugin or theme reported by Codebase manager as having a vulnerability or an available update is an accurate match for the plugin or theme in their application repository or scanned pull request.
- Utilize the
Update URI
header field in custom plugins and themes to prevent them from being accidentally overwritten by an update of a plugin or theme from the WordPress.org Plugin Directory that has a similar name and slug. In plugins theUpdate URI
header should be added to the header file, and for themes it should be added to the main stylesheet. The Bot’s WPScan Analysis supports theUpdate URI
header for themes, even though it is not supported by WordPress itself.
A plugin or theme will be ignored by Codebase Manager scans if the Update URI
header is assigned as false
, or assigned a value that does not contain WordPress.org
or w.org
.
Last updated: July 11, 2024