Framer is the Wordpress killer, there's just 1 thing that needs to change
The WordPress Hook Ecosystem
One of WordPress’s more ingenious design choices is its hook system, which allows developers to tap into virtually any stage of the initialization process and modify behaviour accordingly. This flexibility has been instrumental in its dominance, enabling an entire industry of plugins and customisations. The trade-off, of course, is bloat—when anything can be modified, inevitably, everything will be. Over time, this can lead to performance issues, unexpected conflicts, and a codebase that becomes increasingly difficult to untangle. But in terms of extensibility, few systems come close.
WordPress and the Server-Side Advantage
A key strength of WordPress is the ability for plugins to interact with server-side APIs, keeping certain logic and data securely out of reach of the front end. This allows for advanced functionality—things like user authentication, payment processing, or custom business logic—all executed server-side without exposing sensitive operations to the client. Framer, by contrast, currently lacks this kind of deep integration. Its plugin system is limited to getPluginData
and setPluginData
, both of which are entirely front-end facing. As a result, there’s no true equivalent to WordPress’s ability to execute secure, server-side code.
The Security Implications
Introducing server-side execution would certainly address many of Framer’s current limitations, but it wouldn’t be without its own risks. With greater power comes greater complexity—particularly when it comes to security. A system that allows server-side code execution would need to account for the fact that a site may have multiple plugins installed, some of which could be poorly written or, worse, deliberately malicious.
One of the key concerns is data isolation. Without strict safeguards, a rogue plugin could, in theory, gain access to sensitive data belonging to another plugin, leading to everything from unintended data leaks to outright exploitation. WordPress has faced similar challenges, and while its hook-based architecture provides flexibility, it also requires careful permission handling to prevent cross-plugin vulnerabilities. Framer would need to implement a robust security model—perhaps sandboxing plugins or enforcing strict API scopes—to ensure that extending functionality doesn’t come at the cost of exposing critical data.
Framer’s Component Model
Framer’s architecture is built around front-end components, which makes for an elegant and intuitive design experience. However, the limitation becomes apparent when dealing with dynamic data. At present, the only options for injecting values into a Framer page are via property controls or fetching data directly from an external source—both of which are inherently exposed to the front end. This makes it impossible to securely handle sensitive operations, such as fetching private user data or interacting with backend services in a way that remains hidden from the client.
The Need for Server-Side Code
Ultimately, it all comes down to the need for a proper server-side execution model. If Framer can introduce a way to securely handle backend logic while maintaining its simplicity and speed, it would remove one of the last major constraints on its ecosystem. The ability to build and deploy custom server-side functionality would unlock a whole new tier of applications—one where Framer isn’t just a website builder but a fully-fledged development platform. If they get this right, the potential is enormous.
Don't miss the latest Framer updates!
Sign up for our monthly newsletter to stay up to date. Framer are shipping features fast - be in the know.
FramerJungle
Find resources for your next project.
Powered by BlueboxFrame and @bensummitcodes