Currently supported versions with security updates:
| Version | Supported |
|---|---|
| 1.x.x | ✅ |
| < 1.0 | ❌ |
Please DO NOT report security vulnerabilities through public GitHub issues.
Instead, please report them via:
- Email: [email protected] (recommended)
- GitHub Security Advisory: Use the "Security" tab → "Report a vulnerability"
Please include the following information:
- Type of vulnerability
- Full paths of affected source files
- Location of the affected code (tag/branch/commit)
- Step-by-step instructions to reproduce the issue
- Proof-of-concept or exploit code (if possible)
- Impact of the vulnerability
- Initial Response: Within 48 hours
- Status Update: Within 7 days
- Fix Timeline: Varies by severity (critical issues prioritized)
- We follow coordinated disclosure
- We'll work with you to understand and fix the issue
- We request you give us reasonable time to fix before public disclosure
- We'll credit you in release notes (unless you prefer anonymity)
When contributing to DesignSetGo:
-
Sanitize Input: Use WordPress sanitization functions
sanitize_text_field(),sanitize_textarea_field()sanitize_url(),esc_url()wp_kses_post(),wp_kses_allowed_html()
-
Escape Output: Use WordPress escaping functions
esc_html(),esc_attr()esc_url(),esc_js()
-
Validate Nonces: For all form submissions and AJAX requests
wp_verify_nonce(),check_ajax_referer()
-
Check Capabilities: Use
current_user_can()for permissions -
Prepared Statements: Use
$wpdb->prepare()for database queries -
No
eval(): Never useeval()or similar constructs -
Validate File Uploads: Check file types, sizes, and MIME types
This plugin provides:
- Custom WordPress blocks (editor-only)
- Frontend styling and interactions
- No database modifications beyond post content
- No external API calls
- No file uploads or user data collection
All block features respect WordPress's built-in capability system:
- Block editor access requires
edit_postscapability - No custom capabilities added
- No privilege escalation vectors
We monitor dependencies for security issues via:
- Dependabot alerts
- npm audit
- composer audit (if applicable)
Dependencies are updated promptly when security issues are discovered.
For general security questions (not vulnerabilities), please open a public issue with the security-question label.