If you sell a WordPress plugin with a pro tier, offer paid support, or monetize in any way, the EU Cyber Resilience Act (CRA) applies to you. The first compliance deadline is September 11, 2026 — roughly six months from now. The full requirements land December 11, 2027.
Most solo plugin developers don't know this yet. When Patchstack attempted responsible disclosure across 1,571 plugins in late 2024, they couldn't even reach 1,162 of the developers. Over 900 never responded at all. That's the ecosystem the CRA is about to land on.
This post breaks down exactly what the CRA requires, which plugins are in scope, and the specific AI-powered tools that make compliance manageable for a one-person operation.
The CRA applies to "products with digital elements" placed on the European market with any commercial activity. The trigger is broader than direct sales:
| Your Situation | In Scope? |
|---|---|
| Free plugin, no pro version, no ads, no company | Likely exempt |
| Free plugin with a paid "Pro" version | Yes |
| Free plugin with paid support/consulting | Yes |
| Free plugin maintained by a company | Yes |
| Free plugin that collects data or shows ads | Yes |
| Truly non-monetized, individual maintainer | Likely exempt |
There is no active-users threshold. A plugin with 50 installs and a $29/year pro license faces the same obligations as WooCommerce. The determining factor is commercial activity, not popularity.
If you're unsure, the OpenSSF published a brief guide for OSS developers in July 2025 that clarifies the exemption boundaries. The EU's own open source guidance is the authoritative source.
The obligations fall into four categories. All apply to commercially active plugins targeting EU users.
When you become aware of an actively exploited vulnerability in your plugin:
This clock only starts when exploitation is confirmed in the wild, not when a researcher privately reports a bug to you.
composer.json / package.json)The good news: every technically difficult requirement has AI-powered tooling that handles the heavy lifting. Here's the stack a solo developer actually needs.
Snyk CLI — Run snyk sbom --format cyclonedx1.4+json against your project. It reads your lockfile, generates a CRA-compliant CycloneDX SBOM, and simultaneously scans for known CVEs. Free tier available. Integrates with GitHub Actions for CI/CD automation.
Semgrep Supply Chain — Goes further than dependency listing. Performs reachability analysis to determine whether the vulnerable function is actually called in your code. Dramatically reduces false positives.
CycloneDX Tool Center — Free, open-source generators for PHP Composer, npm, and other ecosystems. No account required.
Snyk Code (SAST) — AI-powered static analysis of your PHP and JavaScript. Catches common plugin vulnerabilities: SQL injection, XSS, CSRF, broken capability checks. Free for open-source projects.
Semgrep — Open-source rule engine with WordPress-specific rulesets. Runs locally and in CI/CD. No data leaves your machine.
GitHub Dependabot — Monitors dependencies for new CVEs and opens PRs automatically. Free. Zero configuration beyond enabling it.
Patchstack Managed VDP — Free for WordPress plugin developers. Handles inbound security reports, filters false positives, assigns CVEs, coordinates disclosure. Over 800 plugin developers already enrolled. This single service covers the hardest CRA obligation for solo developers.
GitHub Private Security Advisories — Structured channel for receiving vulnerability reports. Built-in coordination workflow for disclosure timing and patch preparation.
SECURITY.md to your plugin repo with reporting channel, expected response time, and disclosure timelineIf you can only do three things before September 2026:
One CRA requirement has no clean solution yet: notifying users when a vulnerability is being actively exploited. Most plugin developers distributing through WordPress.org have no direct relationship with their users. You can't identify who installed your plugin. You can't email them a security notice.
The WordPress community, Patchstack, and EU regulators are still working through this tension. For now, the practical approaches are:
The community is calling the CRA "GDPR for software." The comparison is apt: widespread initial panic, eventual practical guidance, and ultimately a mixed compliance reality where small developers do what's proportionate.
The difference this time: AI-powered tools make the technically hard parts — SBOM generation, vulnerability scanning, dependency monitoring — nearly automated. What would have required a dedicated security team five years ago now runs as a GitHub Action or a single CLI command.
The CRA isn't going away. The deadlines are real. But the compliance path for a solo developer is surprisingly tractable: enroll in Patchstack's VDP, add Snyk or Semgrep to your build, generate your SBOMs, and document your security posture. That covers 90% of what you need.
Start with the three things. The rest follows naturally.