This plugin taps into the power of the free and unlimited WordPress Vulnerability Database API to deliver vulnerability assessments directly within your WordPress dashboard. It’s an essential tool for website administrators, developers, and anyone keen on maintaining a secure WordPress environment.

Secure your WordPress experience today, your first line of defense against vulnerabilities!

Comprehensive Security Analysis

  • Core: Checks the version of your WordPress Core against known vulnerabilities, ensuring you’re always aware of potential risks.
  • Plugin: Evaluates all your installed plugins, including those from the official repository, external sources, or premium ones, for any security weaknesses.
  • Theme: Evaluates all your installed themes, including those from the official repository, external sources, or premium ones, for any security weaknesses.
  • PHP: Analyzes your server’s PHP version, detecting vulnerabilities specific to your PHP setup. This is crucial as outdated or unsupported PHP versions can significantly increase security risks.
  • Apache HTTPD: Assesses the version of Apache HTTPD on your server, identifying any known vulnerabilities or misconfigurations that could compromise security.
  • nginx: Evaluates the version of nginx on your server, pinpointing any known vulnerabilities or misconfigurations that could pose security threats.

In-Depth Vulnerability Reporting

Stay ahead of potential threats with detailed reports. If a vulnerability is detected, visit the ‘Site Health’ section in your WordPress dashboard for in-depth information. It informs you about the nature of the vulnerability and provides guidance, such as updating to a newer version or addressing issues with unsupported or unpatched plugins/themes.

Customizable Alert System

Configure the plugin to send periodic notifications about your site’s security status. Choose between daily or weekly updates, ensuring you’re always in the loop about your website’s vulnerability status without being overwhelmed by information.

Why Choose This Plugin?

  • User-Friendly: Designed for ease of use; no technical expertise required.
  • Proactive Security: Helps in early detection and resolution of security issues.
  • Peace of Mind: Ensures you’re always a step ahead in maintaining a secure WordPress site.
  • Privacy-Conscious: The plugin operates with a strong commitment to privacy. It does not store any data from your site nor retrieves personal or sensitive information.
  • Respect for Data Integrity: We understand the importance of your site’s integrity. The plugin works discreetly in the background, ensuring that your content and data remain untouched and unaffected during security checks.


Entón, atoparás estes comandos de wpcli:

  • wp wpvulnerability --help: Get help with these commands.
  • wp wpvulnerability core: List Core vulnerabilities.
  • wp wpvulnerability plugins: List Plugins vulnerabilities.
  • wp wpvulnerability themes: List Themes vulnerabilities.
  • wp wpvulnerability php: List PHP vulnerabilities.
  • wp wpvulnerability apache: List Apache HTTPD vulnerabilities.
  • wp wpvulnerability nginx: List nginx vulnerabilities.

Fiabilidade dos datos

A información proporcionada pola base de datos de información procede de diferentes fontes que foron revisadas por terceiros. Non hai responsabilidade de ningún tipo pola información. Actúa baixo o teu propio risco.


  • WordPress 4.1 – WordPress 6.6.
  • PHP 5.6 – PHP 8.3.
  • WordPress Coding Standards 3.1.0.
  • WP-CLI 2.3.0 – WP-CLI 2.10.0.
  • Plugin Check (PCP)


O plugin adhírese ás seguintes medidas de seguridade e protocolos de revisión para cada versión:


  • Este plugin ou a API da base de datos de WordPress Vulnerability non recolle ningunha información sobre o teu sitio, a túa identidade, os plugins, temas nin o contido que ten o sitio.


  • Non se publicaron vulnerabilidades ata a versión 3.2.0.

Found a security vulnerability? Please report it to us privately at the WPVulnerability GitHub repository.


Podes contribuir a este plugin no repositorio de GitHub de WPVulnerability.


  • Escritorio do widget WP-Admin.
  • Lista de vulnerabilidades na saúde do sitio.
  • Lista de vulnerabilidades na lista de plugins.


Descarga automática

Visita a sección de plugins no seu WordPress, busca [wpvulnerability]; descarga e instala o plugin.

Descarga manual

Extrae os contidos do ZIP e sube os contidos ao directorio /wp-content/plugins/wpvulnerability/. Unha vez subidos, aparecerán na túa lista de plugins.

Preguntas frecuentes

De onde procede a información sobre a vulnerabilidade?

A orixe está na API de WPVulnerability.com. As vulnerabilidades que aparecen nesta API proceden de diferentes fontes, como CVEs.

Envíanse os datos do meu sitio a algún sitio?

Non. Nunca. A túa privacidade é moi importante para nós. Non comercializamos os teus datos.

Qué vulnerabilidades vou atopar?

Vulnerabilities in WordPress Core, Plugins, Themes, PHP, Apache HTTPD, and nginx are documented.

Qué fago se o meu sitio ten unha vulnerabilidade?

En primeiro lugar, tranquilidade. Investiga cal é a vulnerabilidade e, sobre todo, comproba que tes a última versión do elemento comprometido. Recomendámos encarecidamente que manteñas toda a túa instalación de WordPress e os seus plugins ao día.


17 de Abril, 2024
Vulnerabilities are listed into your plugins list.You should also being able to receive an automatic email too. It doesn’t work on my system, but email test yes.So awesome plugin anyway!
8 de Abril, 2024 1 resposta
Exactly what I was looking for ! On the roadmap, it would be nice if : we can chose if we want to receive an email OR not (I may use it as a vuln reminder on the dashboard, as I have other plugins already keeping me informed) we can chose what will be in the email – php or not for exemple (it seems that it is planned, thanks) only receive an email if one the vuln is considered high risk etc.
21 de Febreiro, 2024
This plugin alerts you about known vulnerabilities in your WordPress core, plugins, themes, and even PHP, so you can take action in a timely manner. If you don’t have this plugin on your site already, you absolutely need it!
4 de Febreiro, 2024
Este plugin es de los primeros que instalo en cada proyecto que ejecuto. Tanto para proyectos desde cero y con mucha más razón para corrección de fallos en proyectos iniciados.
26 de Xaneiro, 2024
Sin duda alguna, es el plugin que te ayuda estar informado de vulnerabilidades. Uno de los plugins que instalo por defecto en cuanto empiezo una web.
Ler todas as 18 opinións

Colaboradores e desenvolvedores

“WPVulnerability” é un software de código aberto. As seguintes persoas colaboraron con este plugin.


“WPVulnerability” foi traducido a 13 idiomas. Grazas aos desenvolvedores polas súas contribucións.

Traduce “WPVulnerability” ao teu idioma.

Interesado no desenvolvemento?

Revisa o código, bota unha ollada aorepositorio SVN, ou subscríbete ao log de desenvolvemento por RSS.

Rexistro de cambios

[3.2.0] – 2024-05-08


  • Apache HTTPD vulnerabilities (Site Health).
  • nginx vulnerabilities (Site Health).


  • WordPress 4.1 – WordPress 6.6.
  • PHP 5.6 – PHP 8.3.
  • WordPress Coding Standards 3.1.0.
  • WP-CLI 2.3.0 – WP-CLI 2.10.0.
  • Plugin Check (PCP)

[3.1.2] – 2024-05-08


  • In some cases (when calling it directly, or wget), the cron was not working and gave an error.
  • The license had a non-compliance ID. Now, same license but working.


  • The URL from the API is using its own domain name.


  • WordPress 4.1 – WordPress 6.6.
  • PHP 5.6 – PHP 8.3.
  • WordPress Coding Standards 3.1.0.
  • WP-CLI 2.3.0 – WP-CLI 2.10.0.
  • Plugin Check (PCP)

[3.1.1] – 2024-02-11


  • Fixes some possible PHP warnings when retrieving data from the API.
  • Delete old schedules when unistalling the plugin.
  • Fix how is printed the High severity.


  • The plugin will not show the Exploitability information.


  • Compatibility: WordPress 4.1 – WordPress 6.5.
  • Compatibility: PHP 5.6 – PHP 8.3.
  • Compatibility: WordPress Coding Standards 3.0.1.
  • Compatibility: WP-CLI 2.3.0 – WP-CLI 2.10.0.

Previous versions

If you want to see the full changelog, visit the changelog.txt file.