Detecting Supply Chain issues with Plugin Report

Photograph of a chain link

A Supply Chain Attack is a type of cyber-attack where malicious software (or even hardware) is “smuggled” into the target system by modifying or replacing it while en route to its destination. A number of recent examples have targeted software repositories, such as Javascript’s “npm” and Python’s “PyPi”.

Under the right circumstances, the WordPress plugin repository can be used to execute such an attack. Here’s how that could work.

  1. Your site uses a homebrew or 3rd party plugin that is not hosted on wordpress.org
  2. Somehow, the attacker determines the plugin’s name and version number (this could be as easy as viewing the source of your website)
  3. The attacker creates a plugin with the same name, and a higher version number
  4. The attacker tricks the wordpress.org team into hosting the plugin (possibly by keeping the initial version clean and adding malware later)
  5. Once the plugin is on wordpress.org, wp-admin will alert you there’s a new version available, and possibly even auto-update the plugin
  6. If you update the plugin, you’ll get the attacker’s “newer” version, malware included

Trust

Using a 3rd party plugin on your website involves a considerable amount of trust. WordPress plugins can do pretty much anything on your site, and once a malicious plugin is installed, your site is completely compromised.

This is why plugins should use the “Update URI” header field introduced in WordPress 5.8, to indicate which URL is used to check for updates.

Any plugin that’s not hosted on wordpress.org, but does not specify this using “Update URI”, is a potential vehicle for a supply chain attack. As described above, a hacker could try to get a plugin with the same name accepted on wordpress.org, and infect your website.

The “Update URI” header field is added by the plugin’s author and can have a number of possible values:

ValueResult
Empty or not setwordpress.org’s repository will be used
A valid URLThis allows a plugin to get updates from a different source
“false”This effectively disables updates for that plugin

Plugin Report 2.0.0

I’ve recently released version 2.0.0 of my Plugin Report plugin. It introduces a new column in the report, with information about the repository each plugin uses to get updates from.

To perform its checks, Plugin Report uses the “Update URI” field. If it indicates that a plugin should be present in WordPress’s repository, it checks whether a plugin with that name is indeed found. If that plugin is not found, it’ll display a warning.

Screenshot showing a warning: wordpress.org, plugin not found.

If you get this warning for a plugin you created yourself, you can add “Update URI: false” to its header. If it’s a third party plugin, you could ask the creator to add the header field with whatever value is relevant for that plugin.

Roy Tanck
I'm a freelance WordPress developer, designer, consultant, meetup organizer and speaker. In my spare time I love to go out and take pictures of things.