The team behind the open-source WordPress vulnerability scanner WPScan has launched a database containing information on numerous known security holes affecting WordPress.
The WPScan Vulnerability Database was launched last week at the BruCON security conference, which funded the project through its 5by5 initiative.
“The new vulnerability database will make WPScan’s database files more accessible to the public by presenting them in a more consumable manner within a web interface. This will also make the management of the vulnerabilities we have sourced over the years much easier,” Ryan Dewhurst, the initiator of the WPScan project, wrote in a blog post.
The WPScan Vulnerability Database has been compiled by the WPScan Team and others who have contributed to the development of the vulnerability scanner. Anyone can submit flaws through the website, but all issues are entered into the database manually.
The vulnerabilities have been split into three categories: WordPress core, plugins and themes. So far, the database contain information on approximately 750 WordPress core, 1,300 plugin and 350 theme flaws. The information includes affected software versions, references and classification.
Developers and WPScan users can make use of the data for free via the website or the API as long as it’s not for commercial purposes. A license is required for commercial usage of the vulnerability database.
Some improvements have already been made to the database based on feedback from users, including the addition of CWE classification for vulnerabilities. “There are also lots of other improvements in the pipeline which we hope to make available as soon as possible,” Dewhurst said.
Version 2.5 of WPScan, which is pre-installed on Linux distributions such as BackBox, Kali, Pentoo, SamuraiWTF and ArchAssault, has also been launched. The latest version brings bug fixes and enhancements.
Numerous vulnerabilities have been discovered in WordPress and in WordPress plugins recently. Last month, WordPress fixed a remotely exploitable flaw that could have been leveraged for denial-of-service (DoS) attacks.
The security issues plaguing plugins can also be dangerous. In July, Sucuri reported that a vulnerability in the popular MailPoet newsletter plugin was exploited to compromise thousands of websites. More recently, cybercriminals leveraged a flaw in the Slider Revolution premium plugin to compromise WordPress sites.

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
- High-Severity Privilege Escalation Vulnerability Patched in VMware Workstation
- GoAnywhere MFT Users Warned of Zero-Day Exploit
- UK Car Retailer Arnold Clark Hit by Ransomware
- EV Charging Management System Vulnerabilities Allow Disruption, Energy Theft
- Unpatched Econolite Traffic Controller Vulnerabilities Allow Remote Hacking
- Google Fi Data Breach Reportedly Led to SIM Swapping
- Microsoft’s Verified Publisher Status Abused in Email Theft Campaign
- British Retailer JD Sports Discloses Data Breach Affecting 10 Million Customers
Latest News
- Big China Spy Balloon Moving East Over US, Pentagon Says
- Former Ubiquiti Employee Who Posed as Hacker Pleads Guilty
- Cyber Insights 2023: Venture Capital
- Atlassian Warns of Critical Jira Service Management Vulnerability
- High-Severity Privilege Escalation Vulnerability Patched in VMware Workstation
- Exploitation of Oracle E-Business Suite Vulnerability Starts After PoC Publication
- China Says It’s Looking Into Report of Spy Balloon Over US
- GoAnywhere MFT Users Warned of Zero-Day Exploit
