Wordfence Doesn’t Bother to Look Into Basic Details of Vulnerable Plugins While Claiming to Protect Against Their Vulnerabilities
When it comes to improving the security of WordPress plugins we think that one of things that is needed is a better quality information on the issue. If decisions are being made based on low quality information, then the issues that need to be focused are unlikely to get the focus they need. One of the problems with getting such information that is that much of the information out there comes from security companies, who in many cases know little more than the public. The average person is unlikely to know that because it is easy to sound like you know what you are talking about, without actually having much of a clue what you are talking about.
One good example of this is the WordPress security company Wordfence, that, at best, is not very knowledgable of security. From falsely claiming that brute force attacks are happening against WordPress admin passwords (while promoting that they will protect agains these non-existent attacks), confusing advisories on vulnerabilities with evidence of exploits occurring, and what will be relevant with the rest of this post, claiming that vulnerabilities in plugins have been fixed without checking if that was actually the case. [Read more]