Security Experts:

Connect with us

Hi, what are you looking for?



Researchers Launch WordPress Vulnerability Database

The team behind the open-source WordPress vulnerability scanner WPScan has launched a database containing information on numerous known security holes affecting WordPress.

The team behind the open-source WordPress vulnerability scanner WPScan has launched a database containing information on numerous known security holes affecting WordPress.

The WPScan Vulnerability Database was launched last week at the BruCON security conference, which funded the project through its 5by5 initiative.

“The new vulnerability database will make WPScan’s database files more accessible to the public by presenting them in a more consumable manner within a web interface. This will also make the management of the vulnerabilities we have sourced over the years much easier,” Ryan Dewhurst, the initiator of the WPScan project, wrote in a blog post.

The WPScan Vulnerability Database has been compiled by the WPScan Team and others who have contributed to the development of the vulnerability scanner. Anyone can submit flaws through the website, but all issues are entered into the database manually.

The vulnerabilities have been split into three categories: WordPress core, plugins and themes. So far, the database contain information on approximately 750 WordPress core, 1,300 plugin and 350 theme flaws. The information includes affected software versions, references and classification.

Developers and WPScan users can make use of the data for free via the website or the API as long as it’s not for commercial purposes. A license is required for commercial usage of the vulnerability database.

Some improvements have already been made to the database based on feedback from users, including the addition of CWE classification for vulnerabilities. “There are also lots of other improvements in the pipeline which we hope to make available as soon as possible,” Dewhurst said.

Version 2.5 of WPScan, which is pre-installed on Linux distributions such as BackBox, Kali, Pentoo, SamuraiWTF and ArchAssault, has also been launched. The latest version brings bug fixes and enhancements.

Numerous vulnerabilities have been discovered in WordPress and in WordPress plugins recently. Last month, WordPress fixed a remotely exploitable flaw that could have been leveraged for denial-of-service (DoS) attacks.

The security issues plaguing plugins can also be dangerous. In July, Sucuri reported that a vulnerability in the popular MailPoet newsletter plugin was exploited to compromise thousands of websites. More recently, cybercriminals leveraged a flaw in the Slider Revolution premium plugin to compromise WordPress sites.


Written By

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Expert Insights

Related Content

Cloud Security

VMware vRealize Log Insight vulnerability allows an unauthenticated attacker to take full control of a target system.

IoT Security

Lexmark warns of a remote code execution (RCE) vulnerability impacting over 120 printer models, for which PoC code has been published.

Mobile & Wireless

Apple rolled out iOS 16.3 and macOS Ventura 13.2 to cover serious security vulnerabilities.

Email Security

Microsoft is urging customers to install the latest Exchange Server updates and harden their environments to prevent malicious attacks.

Mobile & Wireless

Technical details published for an Arm Mali GPU flaw leading to arbitrary kernel code execution and root on Pixel 6.


Security researchers have observed an uptick in attacks targeting CVE-2021-35394, an RCE vulnerability in Realtek Jungle SDK.


Google has awarded more than $25,000 to the researchers who reported the vulnerabilities patched with the release of the latest Chrome update.

Mobile & Wireless

Apple’s iOS 12.5.7 update patches CVE-2022-42856, an actively exploited vulnerability, in old iPhones and iPads.