Developer Tools / Regulatory Compliance
February 28, 2026 • 12 min read

The WordPress Plugin Developer's EU CRA Readiness Checklist: What You Need to Do Before 2027

If you sell a WordPress plugin with a pro tier, offer paid support, or monetize in any way, the EU Cyber Resilience Act (CRA) applies to you. The first compliance deadline is September 11, 2026 — roughly six months from now. The full requirements land December 11, 2027.

Most solo plugin developers don't know this yet. When Patchstack attempted responsible disclosure across 1,571 plugins in late 2024, they couldn't even reach 1,162 of the developers. Over 900 never responded at all. That's the ecosystem the CRA is about to land on.

This post breaks down exactly what the CRA requires, which plugins are in scope, and the specific AI-powered tools that make compliance manageable for a one-person operation.

September 11, 2026
Vulnerability reporting obligations begin — 24-hour early warning required
December 11, 2027
Full CRA compliance — SBOM, documentation, CE marking, security-by-design

Is Your Plugin In Scope?

The CRA applies to "products with digital elements" placed on the European market with any commercial activity. The trigger is broader than direct sales:

Your SituationIn Scope?
Free plugin, no pro version, no ads, no companyLikely exempt
Free plugin with a paid "Pro" versionYes
Free plugin with paid support/consultingYes
Free plugin maintained by a companyYes
Free plugin that collects data or shows adsYes
Truly non-monetized, individual maintainerLikely exempt

There is no active-users threshold. A plugin with 50 installs and a $29/year pro license faces the same obligations as WooCommerce. The determining factor is commercial activity, not popularity.

If you're unsure, the OpenSSF published a brief guide for OSS developers in July 2025 that clarifies the exemption boundaries. The EU's own open source guidance is the authoritative source.

What the CRA Actually Requires

The obligations fall into four categories. All apply to commercially active plugins targeting EU users.

1. Security by Design

2. Vulnerability Reporting (Starting September 2026)

When you become aware of an actively exploited vulnerability in your plugin:

This clock only starts when exploitation is confirmed in the wild, not when a researcher privately reports a bug to you.

3. SBOM (Software Bill of Materials)

4. Documentation and CE Marking

AI Tools That Make This Manageable

The good news: every technically difficult requirement has AI-powered tooling that handles the heavy lifting. Here's the stack a solo developer actually needs.

SBOM Generation

Snyk CLI — Run snyk sbom --format cyclonedx1.4+json against your project. It reads your lockfile, generates a CRA-compliant CycloneDX SBOM, and simultaneously scans for known CVEs. Free tier available. Integrates with GitHub Actions for CI/CD automation.

Semgrep Supply Chain — Goes further than dependency listing. Performs reachability analysis to determine whether the vulnerable function is actually called in your code. Dramatically reduces false positives.

CycloneDX Tool Center — Free, open-source generators for PHP Composer, npm, and other ecosystems. No account required.

Security Scanning

Snyk Code (SAST) — AI-powered static analysis of your PHP and JavaScript. Catches common plugin vulnerabilities: SQL injection, XSS, CSRF, broken capability checks. Free for open-source projects.

Semgrep — Open-source rule engine with WordPress-specific rulesets. Runs locally and in CI/CD. No data leaves your machine.

GitHub Dependabot — Monitors dependencies for new CVEs and opens PRs automatically. Free. Zero configuration beyond enabling it.

Vulnerability Disclosure

Patchstack Managed VDP — Free for WordPress plugin developers. Handles inbound security reports, filters false positives, assigns CVEs, coordinates disclosure. Over 800 plugin developers already enrolled. This single service covers the hardest CRA obligation for solo developers.

GitHub Private Security Advisories — Structured channel for receiving vulnerability reports. Built-in coordination workflow for disclosure timing and patch preparation.

The Checklist

Before September 11, 2026 (Reporting Deadline)

Before December 11, 2027 (Full Compliance)

The Three Things to Do This Week

If you can only do three things before September 2026:

  1. Determine your scope. Is your plugin commercially active? If yes, you're in the CRA. If truly non-monetized, document your exemption basis.
  2. Get a formal VDP. Enroll in Patchstack's free managed VDP. This covers the single hardest obligation — handling inbound vulnerability reports professionally — without building custom infrastructure.
  3. Register on ENISA's SRP. So you can actually file the 24h/72h reports if an actively exploited vulnerability hits your plugin. Don't wait until you're under a 24-hour deadline to figure out the filing process.

The Unresolved Problem: Reaching Your Users

One CRA requirement has no clean solution yet: notifying users when a vulnerability is being actively exploited. Most plugin developers distributing through WordPress.org have no direct relationship with their users. You can't identify who installed your plugin. You can't email them a security notice.

The WordPress community, Patchstack, and EU regulators are still working through this tension. For now, the practical approaches are:

This Is GDPR 2.0 — But You Have Better Tools

The community is calling the CRA "GDPR for software." The comparison is apt: widespread initial panic, eventual practical guidance, and ultimately a mixed compliance reality where small developers do what's proportionate.

The difference this time: AI-powered tools make the technically hard parts — SBOM generation, vulnerability scanning, dependency monitoring — nearly automated. What would have required a dedicated security team five years ago now runs as a GitHub Action or a single CLI command.

The CRA isn't going away. The deadlines are real. But the compliance path for a solo developer is surprisingly tractable: enroll in Patchstack's VDP, add Snyk or Semgrep to your build, generate your SBOMs, and document your security posture. That covers 90% of what you need.

Start with the three things. The rest follows naturally.

Key Resources