Fede Marsell
Basic Pleskian
- Server operating system version
- AlmaLinux release 8.10
- Plesk version and microupdate number
- 18.0.74
Why are extensions being installed on servers without explicit authorization?
Following the previous security incident related to the unauthorized installation of Immunify (Issue - Important: Imunify auto installation and possible data leak), we are now facing another unexplained case.
The Joomla extension has installed itself automatically — without any manual action or approval from our side.
This is extremely concerning.
For clarity, our configuration explicitly disables automatic extension installation. In panel.ini, we have:
[ext-catalog]
extensionAutoInstall = false
Despite this setting being in place, the extension was installed anyway.
From a technical and security perspective, this raises serious concerns:
At this point, the Extensions system appears to represent a potential security risk if software can be deployed remotely regardless of administrator configuration.
We require a clear technical explanation and a definitive method to prevent this from happening again.
Following the previous security incident related to the unauthorized installation of Immunify (Issue - Important: Imunify auto installation and possible data leak), we are now facing another unexplained case.
The Joomla extension has installed itself automatically — without any manual action or approval from our side.
This is extremely concerning.
For clarity, our configuration explicitly disables automatic extension installation. In panel.ini, we have:
[ext-catalog]
extensionAutoInstall = false
Despite this setting being in place, the extension was installed anyway.
From a technical and security perspective, this raises serious concerns:
- Why is Plesk installing extensions when auto-installation is explicitly disabled?
- Is this behavior intentional?
- Does Plesk override panel.ini settings under certain conditions?
- What mechanism allows this to happen?
- How can we guarantee that no further components will be deployed without administrator consent?
At this point, the Extensions system appears to represent a potential security risk if software can be deployed remotely regardless of administrator configuration.
We require a clear technical explanation and a definitive method to prevent this from happening again.