Securing The Web Perimeter: How Unpatched WordPress Installs Can Increase the Risk of Security Breaches

The Equifax and Yahoo breaches have highlighted just how vulnerable enterprises are to cyber attacks that aim to exfiltrate data by exploiting web application vulnerabilities. Content Management Systems (CMS) are among the most popular platforms on the world wide web - over 30% of the websites in the Alexa top 1 million use WordPress.

Exploits of WordPress have soared in recent times. Securing a combination of legacy environments and newer stacks, keeping up with the latest security patches, and reducing response times to zero-day vulnerabilities all remain challenges for organizations using WordPress.

This white paper outlines some common causes of WordPress vulnerabilities and offers guidelines on securing WordPress installations.

The Cloudflare Difference

icon learning center orange

Inbuilt Intelligence for faster rule updates

Protect web applications by applying Cloudflare's range of battle-tested rule sets and by utilizing intelligence gathered from a network of 27 million Internet properties.

icon configuration orange

Full customization

Build fully customizable and granular rules based upon multiple request attributes such as user-agent, path, country, query string, IP address, and more, to stop emerging and sophisticated threats.

icon performance orange

Security without sacrificing performance

Prevent downtime and unavailability with Cloudflare’s global Anycast network spanning 200 cities across 95 countries, and offering a scalable infrastructure backbone.

Trusted By

Over 27 million Internet properties

trustedby crunchbase black
trustedby ao com black
trustedby zendesk black
logo sofi gray 32px wrapper
trustedby log me in black
trustedby digital ocean black
trustedby okcupid black
trustedby montecito black
trustedby discord black
trustedby library of congress black
trustedby udacity black
trustedby marketo black