Too vulnerable to hackers’ attacks
-
The LiteSpeed Cache plugin became the target of hackers’ attacks in May, 2024, and after three months, it became their target again in August, 2024. I must say that this plugin is too vulnerable to hacking. The LiteSpeed development team should stop developing it immediately. Instead, they should implement the cashing functions directly in the LiteSpeed Server so that it can be updated by hosting companies when security issues arise. The LiteSpeed people do not seem to know how much time and money is wasted updating the LiteSpeed Cache plugin when security issues arise and there are hundreds of WordPress websites where I have to update this plugin one by one manually. I am seriously considering switching to another caching plugin. Once is okay, but twice is unbearable. Three times will be out of the question. Seurity issues mean that if a hacker finds your website with a vulnerable version of this plugin before you update it, he may take over your account in a few minutes and do whatever he wants to do with it, like creating his own websites, namely phishing sites, and that you may get arrested instead of the true culprit.
- You must be logged in to reply to this review.