Thank you for acknowledging my feedback, but I find your response deflects the severity of this situation.
Firstly, ranking #5 among WordPress plugins with the most vulnerabilities in a popular vulnerability database is telling on its own. Just this year, this plugin has experienced three critical vulnerabilities—demonstrating a pattern of insufficient code sanitation, which is a basic security practice, not rocket science.
The issue is clearly not limited to “potential” exploitation; my case proves these vulnerabilities are actively being exploited in the wild. In fact, shortly after my review, another remote code execution vulnerability emerged, despite your claims of heightened prioritization and rapid patching. The fact that I had automatic updates enabled underscores that patches are coming too late.
It’s frustrating that you’re downplaying this by framing it as “inevitable” for widely used software. Contrary to your implication, many popular software products remain secure without repeated critical issues.
Your focus seems entirely on reacting to vulnerabilities after they’re discovered and damage control, rather than proactively preventing them through regular, rigorous code audits. Start by hiring programmers that know what they’re doing.
This isn’t simply about communication; it’s about delivering a secure product from the start.