In the WordPress ecosystem, we are often forced to choose between supporting the “lowest common denominator” of hosting and implementing modern security. But in 2026, writing legacy PHP 7 code isn’t just a bad habit, it’s an active invitation for automated exploitation. It’s time to stop playing “whack-a-mole” with sanitization and start building products that are secure by design.
This talk isn’t just another slide deck on security tips, through comparisons of a Vulnerability Lab plugin, you will see how common exploits like authentication bypass and Server Side Request Forgery succeed on legacy code, only to be neutralized by the native shields of the latest PHP. You will learn how to leverage the modern PHP patterns to ensure your plugins are resilient to a wide range of exploits.





