The following versions of the Woodev plugin are currently being supported with security updates:
| Version | Supported |
|---|---|
| Latest | ✅ |
| < Latest | ❌ |
We recommend always using the latest version.
Please do not report security vulnerabilities through public GitHub issues.
Instead, please create a private vulnerability report using GitHub's private vulnerability reporting feature.
Please include the following information in your report:
- Description of the vulnerability
- Steps to reproduce the issue
- Potential impact of the vulnerability
- Any suggested fixes (if you have them)
- Your contact information for follow-up questions
You can expect a response within 48 hours acknowledging your report. We will keep you informed of our progress as we investigate and address the issue.
- We will acknowledge your report within 48 hours
- We will provide a status update within 7 days
- We aim to resolve critical issues within 30 days
- We will coordinate with you on public disclosure timing
When contributing to this project, please follow these security best practices:
- Validate all user input — Never trust user input; always validate and sanitize
- Use WordPress functions — Use
sanitize_text_field(),esc_html(),wp_nonce_field(), etc. - Check capabilities — Always verify user permissions with
current_user_can() - Use prepared statements — For database queries, use
$wpdb->prepare() - Avoid eval() — Never use
eval()or similar functions with user input - Keep dependencies updated — Regularly update all dependencies
For additional security, consider implementing these headers on your server:
Strict-Transport-SecurityContent-Security-PolicyX-Content-Type-OptionsX-Frame-OptionsX-XSS-Protection
We appreciate responsible disclosure and will credit security researchers who report valid vulnerabilities (unless they prefer to remain anonymous).
Thank you for helping keep Woodev and its users safe!