WordPress Security: Use Nonce to protect themes and plugin code
Protecting the security of WordPress themes or plug-in code is crucial and can effectively prevent attacks from malicious users. We've covered before how to clean, escape, and validate form data in WordPress, and how to use VIP scanner to improve the quality of WordPress themes. Today, we will explore how Nonce (one-time digital) can help keep WordPress themes and plugins secure.
Key Points
- WordPress Nonce, or "one-time use number", is a unique security token used to enhance the security of WordPress websites by verifying user requests and preventing malicious attempts. They are particularly useful in preventing cross-site request forgery (CSRF) attacks.
- Nonce works by generating a unique token for each user session, form submission, or AJAX request. This token is then verified when processing the request, and if it does not match, the request is rejected. This makes it difficult for attackers to predict or abuse the token.
- Creating Nonce in WordPress is achieved by using the WordPress function
wp_create_nonce()
, which accepts a single string parameter representing the operation to be protected. Verification Nonce is done using thewp_verify_nonce()
function, which accepts two parameters: the Nonce to be verified and the associated operation. - Nonce can be used for AJAX requests in WordPress, adding an additional layer of security to prevent CSRF attacks. Nonce is also user-specific, providing an additional layer of security by ensuring that Nonce created for one user is invalid for another.
What is WordPress Nonce?
WordPress Nonce is defined as:
…A "one-time use number" to help protect URLs and forms from certain types of abuse (malicious or otherwise). http://ipnx.cn/link/c5af1dfde10402285102771ad64b3dac
While in WordPress, Nonce is not a technically number (it is a hash of letters and numbers), it does help prevent malicious users from running actions.
WordPress Nonce's work is divided into two parts:
- Create Nonce (hash value), submit it through form or action, and
- Verify Nonce, then accept form data or run the action.
For example, when you delete a post in the WordPress admin screen, you will notice that the URL contains a _wpnonce
parameter:
http://ipnx.cn/link/18175d262a01ebf04bc03e38e48e3ffc
The routine to delete a post will check if post 542 has a Nonce value of a03ac85772
before deleting the post. If Nonce does not exist or does not match the expected value, the post will not be deleted.
This prevents malicious users from potentially deleting large numbers of posts. For example, the following will not work because Nonce belongs to post ID 542:
http://ipnx.cn/link/322d830da1130169fb4ca1c7543799d0 http://ipnx.cn/link/dd4143061640d55fb312dd0ce8afa76e http://ipnx.cn/link/9e0f9113b44003201076a9fade1b72d8
Now let's see how to implement WordPress Nonce in a plugin.
Set up our WordPress plugin
Let's start with a basic plugin with its own settings screen. The settings screen has a field that can be submitted and saved in the WordPress options table.
Enter the following code into a new file in wp-content/plugins/implementing-wordpress-nonces/implementing-wordpress-nonces.php
:
// ... (插件代碼,與原文相同) ...
Activate the plugin via WordPress Management> plugin screen and you will see a new Nonces menu item:
Click this item and you will be taken to the settings screen, with only one field:
Enter any value, click "Save", if everything works, you will see the confirmation information and the value you just entered:
Demonstrate security vulnerability
Enter the following URL into your web browser address bar (replace the domain name with where you installed WordPress):
http://ipnx.cn/link/0e143c3bef0f7759c230664c4dc905f8
Attention what happened? The value is simply saved as abc, just directly access the URL and log in to WordPress:
While we can use $_POST
in our code instead of $_REQUEST
(we use $_REQUEST
to demonstrate security issues more easily), this doesn't help - malicious users can still use themselves or induce you to click on the link Lets you send a POST request to this screen, resulting in a change in option values.
This is called cross-site request forgery (or CSRF). Malicious websites, emails, applications, etc. will cause the user's web browser to perform unnecessary operations.
We will now create and verify WordPress Nonce to prevent this attack from becoming possible.
Protect our plug-ins with Nonce
As mentioned earlier, this process is divided into two steps: First, we need to create a Nonce that will be submitted with our form. Second, we need to verify the Nonce when submitting the form.
To create a Nonce field in our form, we can use wp_nonce_field()
:
Get or show Nonce hidden form fields... Used to verify that the content of the form request comes from the current site, not elsewhere...
Add the following code above our input button:
// ... (插件代碼,與原文相同) ...
wp_nonce_field
Accept four parameters-the first two are the most important:
$action
: This determines the specific operation we are running and should be unique. It is best to use the plugin name as the prefix for the operation, as there may be multiple operations running. In this case, we are saving something, so we useimplementing_wordpress_nonces_save
$name
: This determines the name of the hidden field created by this function. As mentioned above, we have used the plugin name as its prefix, so we named itimplementing_wordpress_nonces_nonce
If we reload the settings screen, change our value and click Save, you will notice that the value will still change. We now need to implement the checking of the submitted Nonce field, using wp_verify_nonce( $name, $action )
:
Verify that Nonce is correct and has not expired relative to the specified operation. This function is used to verify the Nonce sent in the current request, usually accessed via the
$_REQUEST
PHP variable.
Replace the "Save Settings" part of the admin_screen()
function of our plugin with the following code:
wp_nonce_field( 'implementing_wordpress_nonces_save', 'implementing_wordpress_nonces_nonce' );
This code performs the following operations:
- First, it checks if we have submitted something.
- Then it checks if our Nonce field exists and, if so, try to verify the value of Nonce based on the action we expect.
- If the check passes, update the options.
- If the check fails, we will throw a 403 error with the message "Invalid Nonce specified".
To make sure our Nonce is being created and verified, let's try again to access our "malicious" direct URL:
http://ipnx.cn/link/0e143c3bef0f7759c230664c4dc905f8.
>If our Nonce is implemented and is being verified, you will see an "Invalid Nonce Specification" notification:
...(The rest is the same as the original text, but the language and expression are adjusted in detail to keep the original intention unchanged)....
The above is the detailed content of What Are WordPress Nonces?. For more information, please follow other related articles on the PHP Chinese website!

Hot AI Tools

Undress AI Tool
Undress images for free

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

Notepad++7.3.1
Easy-to-use and free code editor

SublimeText3 Chinese version
Chinese version, very easy to use

Zend Studio 13.0.1
Powerful PHP integrated development environment

Dreamweaver CS6
Visual web development tools

SublimeText3 Mac version
God-level code editing software (SublimeText3)

Hot Topics

The main reasons why WordPress causes the surge in server CPU usage include plug-in problems, inefficient database query, poor quality of theme code, or surge in traffic. 1. First, confirm whether it is a high load caused by WordPress through top, htop or control panel tools; 2. Enter troubleshooting mode to gradually enable plug-ins to troubleshoot performance bottlenecks, use QueryMonitor to analyze the plug-in execution and delete or replace inefficient plug-ins; 3. Install cache plug-ins, clean up redundant data, analyze slow query logs to optimize the database; 4. Check whether the topic has problems such as overloading content, complex queries, or lack of caching mechanisms. It is recommended to use standard topic tests to compare and optimize the code logic. Follow the above steps to check and solve the location and solve the problem one by one.

Miniving JavaScript files can improve WordPress website loading speed by removing blanks, comments, and useless code. 1. Use cache plug-ins that support merge compression, such as W3TotalCache, enable and select compression mode in the "Minify" option; 2. Use a dedicated compression plug-in such as FastVelocityMinify to provide more granular control; 3. Manually compress JS files and upload them through FTP, suitable for users familiar with development tools. Note that some themes or plug-in scripts may conflict with the compression function, and you need to thoroughly test the website functions after activation.

Methods to optimize WordPress sites that do not rely on plug-ins include: 1. Use lightweight themes, such as Astra or GeneratePress, to avoid pile-up themes; 2. Manually compress and merge CSS and JS files to reduce HTTP requests; 3. Optimize images before uploading, use WebP format and control file size; 4. Configure.htaccess to enable browser cache, and connect to CDN to improve static resource loading speed; 5. Limit article revisions and regularly clean database redundant data.

PluginCheck is a tool that helps WordPress users quickly check plug-in compatibility and performance. It is mainly used to identify whether the currently installed plug-in has problems such as incompatible with the latest version of WordPress, security vulnerabilities, etc. 1. How to start the check? After installation and activation, click the "RunaScan" button in the background to automatically scan all plug-ins; 2. The report contains the plug-in name, detection type, problem description and solution suggestions, which facilitates priority handling of serious problems; 3. It is recommended to run inspections before updating WordPress, when website abnormalities are abnormal, or regularly run to discover hidden dangers in advance and avoid major problems in the future.

TransientsAPI is a built-in tool in WordPress for temporarily storing automatic expiration data. Its core functions are set_transient, get_transient and delete_transient. Compared with OptionsAPI, transients supports setting time of survival (TTL), which is suitable for scenarios such as cache API request results and complex computing data. When using it, you need to pay attention to the uniqueness of key naming and namespace, cache "lazy deletion" mechanism, and the issue that may not last in the object cache environment. Typical application scenarios include reducing external request frequency, controlling code execution rhythm, and improving page loading performance.

The most effective way to prevent comment spam is to automatically identify and intercept it through programmatic means. 1. Use verification code mechanisms (such as Googler CAPTCHA or hCaptcha) to effectively distinguish between humans and robots, especially suitable for public websites; 2. Set hidden fields (Honeypot technology), and use robots to automatically fill in features to identify spam comments without affecting user experience; 3. Check the blacklist of comment content keywords, filter spam information through sensitive word matching, and pay attention to avoid misjudgment; 4. Judge the frequency and source IP of comments, limit the number of submissions per unit time and establish a blacklist; 5. Use third-party anti-spam services (such as Akismet, Cloudflare) to improve identification accuracy. Can be based on the website

When developing Gutenberg blocks, the correct method of enqueue assets includes: 1. Use register_block_type to specify the paths of editor_script, editor_style and style; 2. Register resources through wp_register_script and wp_register_style in functions.php or plug-in, and set the correct dependencies and versions; 3. Configure the build tool to output the appropriate module format and ensure that the path is consistent; 4. Control the loading logic of the front-end style through add_theme_support or enqueue_block_assets to ensure that the loading logic of the front-end style is ensured.

To add custom user fields, you need to select the extension method according to the platform and pay attention to data verification and permission control. Common practices include: 1. Use additional tables or key-value pairs of the database to store information; 2. Add input boxes to the front end and integrate with the back end; 3. Constrain format checks and access permissions for sensitive data; 4. Update interfaces and templates to support new field display and editing, while taking into account mobile adaptation and user experience.
