| Version | Supported |
|---|---|
release branch |
Yes |
development branch |
Yes |
beta branch |
Yes |
| Other branches | No |
We take the security of this project seriously. If you discover a security vulnerability, please follow responsible disclosure.
- Do NOT open a public issue for security vulnerabilities
- Report privately via GitHub Security Advisories
- Include:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if any)
- Acknowledgment: Within 48 hours
- Initial assessment: Within 7 days
- Fix timeline: Depends on severity
- Critical: 7 days
- High: 14 days
- Medium: 30 days
- Low: 60 days
This project involves Docker containerization, so security concerns may include:
- Container escape vulnerabilities
- Privilege escalation in Docker configs
- Exposed ports or services
- Insecure default configurations
- Dependency vulnerabilities (PHP extensions, base images)
- Credential handling in entrypoint scripts
- Nginx/Apache misconfigurations
- WordPress core vulnerabilities (report to WordPress)
- Third-party plugin/theme vulnerabilities
- MariaDB or Redis upstream vulnerabilities
When deploying this stack:
- Never commit
.envfiles or credentials to the repository - Use strong, unique passwords for all services
- Keep base images updated (
docker compose pullregularly) - Run behind a reverse proxy with TLS termination
- Restrict network access to management ports
- Monitor container logs for suspicious activity
- Use
FLUSH_REDIS_ON_STARTUP=trueafter credential changes
We appreciate responsible disclosure from the security community. Contributors who report valid vulnerabilities will be credited (with permission) in release notes.