🦸 Calling all superheroes! Introducing the WordPress Superhero Challenge for the Wordfence Bug Bounty Program: Earn up to $31,200 for High Impact Vulnerabilities! Through October 14th, 2024, all vulnerabilities reported in plugins or themes with >= 5,000,000 active installs will be 3x our highest bounty rewards making our top reward $31,200. Check out the updated bounties here!
Title | Number of Vulnerabilities | Last Vulnerability |
---|---|---|
Social Gallery and Widget | 1 | September 20, 2021 |
To Top | 1 | September 20, 2021 |
Wp Cookie Choice | 1 | September 20, 2021 |
YITH Easy Login & Register Popup for WooCommerce | 1 | September 20, 2021 |
微信打赏(Wechat Reward) | 1 | September 20, 2021 |
Frontend Uploader | 2 | September 21, 2021 |
Game Server Status | 1 | September 21, 2021 |
jQuery Reply to Comment | 1 | September 21, 2021 |
Responsive WordPress Slider | 1 | September 21, 2021 |
St-Daily-Tip | 1 | September 21, 2021 |
Video Gallery – Vimeo and YouTube Gallery | 1 | September 21, 2021 |
WP HTML Author Bio | 1 | September 21, 2021 |
Telefication | 1 | September 21, 2021 |
Easy Media Download | 2 | September 22, 2021 |
3DPrint Lite | 1 | September 23, 2021 |
ark-commenteditor | 1 | September 23, 2021 |
YITH Maintenance Mode | 3 | September 23, 2021 |
Contact Forms – Drag & Drop Contact Form Builder | 1 | September 27, 2021 |
Great Quotes | 1 | September 27, 2021 |
WP Visited Countries Reloaded | 1 | September 27, 2021 |
Did you know Wordfence Intelligence provides free personal and commercial API access to our comprehensive WordPress vulnerability database, along with a free webhook integration to stay on top of the latest vulnerabilities added and updated in the database? Get started today!
Learn moreWant to get notified of the latest vulnerabilities that may affect your WordPress site?
Install Wordfence on your site today to get notified immediately if your site is affected by a vulnerability that has been added to our database.
The Wordfence Intelligence WordPress vulnerability database is completely free to access and query via API. Please review the documentation on how to access and consume the vulnerability data via API.
Documentation