Patchstack Now Withholding Misappropriated Information Needed to Secure Plugins in WordPress Plugin Directory From WordPress
Last week, we posted how WordPress had left a known vulnerable WordPress plugin with 100,000+ installs that is being targeted by a hacker in the WordPress Plugin Directory. The plugin continues to be in the plugin directory despite one of the Team Reps for the Plugins Team, David Perez, and the Senior Team member of the team, Samuel (Otto) Wood, being informed of that.
It turns out that there is another party partially responsible for the situation. It is a party that has already been engaged in unethical behavior and things have gotten worse now.
Responsible disclosure involves, among other things, notifying the developer of software vulnerabilities first. A number of WordPress security providers have major efforts to get vulnerabilities reported to them instead of to the developers or WordPress. The reason for that is so that they can profit off of those vulnerabilities. Beyond the ethical issue, this often leads to vulnerabilities that are not actually fixed, as these providers don’t properly vet the vulnerability claims and fixes. They then don’t provide that information to others, like ourselves, which actually fully vet things. And it causes unnecessary headaches for plugin developers.
The head of one of those providers, Patchstack’s Oliver Sild, has indirectly admitted this isn’t ethical. (Patchstack also admits to corner cutting when vetting vulnerability claims.) Now Patchstack is stating they are not providing WordPress itself with the information as well. Here is the response from Patchstakck’s Darius Sveikauskas, when asked about reporting the vulnerability in the plugin mentioned above to the Plugins team:
The whole thing is crazy. Patchstack is trying to get vulnerability reports directed away from developers to an external party, themselves, and then claiming that WordPress having the same information is somehow problematic, if not illegal. They clearly are not interested in responsible vulnerability disclosure considering they have a massive effort to get in the way of that. They are also lying about the EU’s CRA again.
In a follow up comment from the same Patchstack employee, they put forward their business model of trying to profit off information on vulnerabilities in WordPress plugins being redirected to them as an altruistic action (the number of identified vulnerabilities is widely off):
I really don’t have time for discussions like this. I mean, I could spend this time in a much more productive way – bringing greater value to the community. Just for your information: Patchstack has identified over 11,000 vulnerabilities in the WordPress ecosystem, and it cost those affected vendors nothing – $0. However, we spend $250,000+ just on bounties to reach that result and motivate independent researchers. So next time, before questioning our business model, please check the facts and consider the value we’ve delivered to the community.
Lack of Coverage
This is a serious issue, and yet it hasn’t received any coverage. In fact, just a week ago The Repository, which is run by a content marketer Rae Morey, misleadingly claiming to be a journalist ran a story promoting Patchstack’s redirection of vulnerability reports away from developers as if it is a positive. In line with them being a content marketer, Patchstack is one The Repository’s advertisers. Which was disclosed at the end of the story, misleadingly as them being a “Community Sponsor.” We left a comment on the story about it being misleading as to what is going on and Rae Morey again pushing Patchstack’s misrepresentation of the EU’s CRA. The comment wasn’t approved. (That isn’t surprising since the website is a content marketing project disguised as a journalistic outlet.) We left a reply on Bluesky asking if they were going to cover this situation, with no response so far.