The average WordPress site runs 20–30 plugins. Each one is third-party code with full access to your database, your files, and your admin panel. A plugin audit is not a nice-to-have — it is how our security experts start every new client engagement, because what we find is almost always a surprise to the site owner.
What a Plugin Audit Actually Involves
This is not just checking if updates are available. A thorough plugin audit covers:
- Installed vs. active inventory — deactivated plugins still run code that can be exploited. We catalogue everything installed, not just what's switched on.
- CVE and vulnerability database check — every plugin is checked against known vulnerability databases (WPScan, NVD) to identify whether any version of the installed plugin has a known exploit.
- Update status and support status — a plugin that hasn't been updated in 12 months may be abandoned. Abandoned plugins don't receive security patches.
- Plugin reputation and source — nulled (pirated) plugins are a direct injection vector. We've removed them from client sites more times than we can count.
- Permission scope review — some plugins request database and file access they don't need. Unnecessary permissions increase blast radius if a plugin is compromised.
The Most Common Findings After 20+ Years of Audits
- Deactivated plugins from years ago that contain exploitable vulnerabilities.
- Plugins running versions 3–5 major releases behind the current stable.
- Duplicate functionality plugins (three contact form plugins for a site that only uses one).
- Page builder addons installed as trials and never removed.
- At least one plugin that has since been removed from the WordPress.org repository (a red flag).
How to Run a Basic Audit Yourself
- Go to Plugins → Installed Plugins. Sort by "Inactive." Delete everything inactive that you don't intend to reactivate immediately.
- For each active plugin, check its last update date in the WordPress plugin repository. Flag anything not updated in the past 6 months.
- Cross-reference active plugins against the WPScan vulnerability database for your specific version numbers.
- Check for any plugins not sourced from wordpress.org or a reputable commercial vendor.
When to Bring in Experts
A manual self-audit catches obvious issues. It won't catch malware already embedded in plugin files, obfuscated code injected into legitimate plugins, or supply chain compromises. Our security team runs automated file integrity checks alongside manual review to find what basic audits miss.
Related resources
Continue with the pages buyers usually visit next after reading this topic.
