This plugin, with the free and unlimited WordPress Vulnerability Database API, allows to analyze all published vulnerabilities directly from your WordPress.
- The current version of your WordPress will be checked.
- All the plugins you have, whether from the repository, external or premium, will be checked.
- All the themes you have, whether from the repository, external or premium, will be checked.
In case there is any documented vulnerability, you can visit the Site Heath of your WordPress and find the vulnerability information. You may find that your plugin or theme has a vulnerability, and it is as simple as upgrading to an updated version; it will inform you if the plugin/theme is no longer available for download or does not have a patch.
In settings you will have the options to send notification periodically for your installation. You can select between every day or weekly basis.
And then, You will find these wpcli commands:
wp wpvulnerability --help
wp wpvulnerability plugins (partially implemented)
wp wpvulnerability core (not implemented yet)
wp wpvulnerability themes (not implemented yet)
This plugin or the WordPress Vulnerability Database API does not collect any information about your site, your identity, the plugins, themes or content the site has.
The information provided by the information database comes from different sources that have been reviewed by third parties. There is no liability of any kind for the information. Act at your own risk.
You can contribute to this plugin at the WPVulnerability GitHub repository.
Visit the plugin section in your WordPress, search for [wpvulnerability]; download and install the plugin.
Extract the contents of the ZIP and upload the contents to the
/wp-content/plugins/wpvulnerability/ directory. Once uploaded, it will appear in your plugin list.
Where does the vulnerability information come from?
The origin is in the WPVulnerability.com API. The vulnerabilities that appear in this API come from different sources, such as CVEs.
Is data from my site sent anywhere?
No. Never. Your privacy is very important to us. We do not commercialize with your data.
What vulnerabilities will I find?
Vulnerabilities in WordPress core, plugins and themes are documented.
What do I do if my site has a vulnerability?
First of all, peace of mind. Investigate what the vulnerability is and, above all, check that you have the latest version of the compromised element. We actively recommend that you keep all your WordPress and its plugins up to date.
Bijdragers & ontwikkelaars
“WPVulnerability” is open source software. De volgende personen hebben bijgedragen aan deze plugin.Bijdragers
“WPVulnerability” is vertaald in 11 talen. Dank voor de vertalers voor hun bijdragen.
Vertaal “WPVulnerability” naar jouw taal.
Interesse in ontwikkeling?
Bekijk de code, haal de SVN repository op, of abonneer je op het ontwikkellog via RSS.
- Code security improvements
- Fix the Severity value
- A better Site Health information
- Compatibility: WordPress 5.2 – WordPress 6.2
- Compatibility: PHP 7.2 – PHP 8.1
- Improved security in code.
- Information, when available, about the vulnerability, in a simplified way. Only in the plugin list.
- Information, when available, about the potential severity and exploitability. Only in the plugin list.
- Links to sources to get additional information. Only in the plugin list.
- Sends email periodically. You can choose who is going to receive the emails.
- First approach to WPCLI Commands (thanks to @lbonomo).