Security Hole in Cloud Hosting Control Panels - Article: Vladimir vs Hosting Industry
- 
Hi everyone, I came across this article that might be of interest. Teaser: Vladimir vs Hosting Industry
 This is what I gathered from the article, and I am no expert: Vladimir Smitka, a security researcher/hobbyist from the Czech Republic has found that one weak or compromised site on a server can be used to control / manipulate and gain access to other sites on the same server. That is, many run multiple wordpress sites on a single server - some of these sites are just test or hobby sites that are not secured very well. 
 These sites, if compromised, can be used to launch attacks on other sites on the same server even if the installations are isolated dockers.Seems like most famous web panel providers like Cloudways, RunCloud, etc have failed the test and more importantly have not taken any steps to address the issue and patch the vulnerabilities. Providers I tested: Serveravatar – didn’t found the way how to break site isolation (but was able to bypass some default security measures and you have to be very careful with some of the features) 
 Enhance.com -fixed instantly
 InstaWP – fixed
 Xcloud.host – fixed
 GridPane – fixed most issues pretty quick
 Ploi – investigating for 2 months, will be fixed soon
 Cloudways – not fixed after 3 months
 RunCloud – investigating few weeks, not fixed yet
 FlyWP – investigating more than month, not fixed yet
 Cloudpanel – will be fixed in distant future
 SpinupWP – feature not a bug
 Forge – don’t careConclusion: Docker doesn’t automatically guarantee security. Should we be worried? 
 What measures are you currently taking to secure your WP sites.
 And what are some good practices that we must adopt?
- 
My first reaction on reading about cloudways was to smirk at them and feel smug about my decision to abandon that sinking ship of a platform (constant upsells for almost everything), but it hit me - I mustn't be so cocky. Let me check with our friendly community. 
 
