Book Image

WordPress 5 Cookbook

By : Rakhitha Nimesh Ratnayake
4 (1)
Book Image

WordPress 5 Cookbook

4 (1)
By: Rakhitha Nimesh Ratnayake

Overview of this book

WordPress has been the most popular content management system (CMS) for many years and is now powering over 30% of all websites globally. With the demand for WordPress development and skilled developers ever-increasing, now is the best time to learn WordPress inside out. This book starts with simple recipes for configuring WordPress and managing basic platform features. You’ll then move on to explore how to install and customize WordPress plugins, widgets, and themes. The next few chapters cover recipes for content and user-management-related topics such as customizing the content display, working with content types, using the new Gutenberg editor, and customizing editorial workflow for building advanced blogs. As you advance, you’ll learn how to use WordPress as an application framework as well as a platform for building e-commerce sites. This WordPress book will also help you optimize your site to maximize visibility on search engines, add interactivity, and build a user community to make the site profitable. Finally, you’ll learn how to maintain a WordPress site smoothly while taking precautions against possible security threats. By the end of the book, you’ll have the tools and skills required to build and maintain modern WordPress websites with the latest technologies and be able to find quick solutions to common WordPress problems.
Table of Contents (16 chapters)

Securing database user accounts

WordPress database access details are stored in the config file inside the root folder. We have to provide these details in the installation process. Generally, we set up the site with a user that has permissions to execute all types of operations in the database. These details can lead to major security threats in the following scenarios:

  • Attackers gaining access to the wp-config.php file—if this file is not protected on your site, an external user has the ability to gain access to the details inside the file. Then, the attacker can easily modify the database by using the login details of database users unless there are additional layers of protection from the hosting server.
  • Executing dangerous queries from third-party plugins and themes—we use many third-party plugins and themes in WordPress site development. Often, we don&apos...