🦸 Calling all superheroes! Introducing the WordPress Superhero Challenge for the Wordfence Bug Bounty Program: Earn up to $31,200 for High Impact Vulnerabilities! Through October 14th, 2024, all vulnerabilities reported in plugins or themes with >= 5,000,000 active installs will be 3x our highest bounty rewards making our top reward $31,200. Check out the updated bounties here!
Title | Number of Vulnerabilities | Last Vulnerability |
---|---|---|
ZM Ajax Login & Register | 3 | April 14, 2023 |
ZM Gallery | 1 | December 16, 2016 |
Zoho Campaigns | 4 | July 11, 2024 |
Zoho CRM Lead Magnet | 4 | July 11, 2024 |
Zoho Marketing Automation | 1 | June 21, 2024 |
Zoho SalesIQ – Live chat, chatbots, and visitor tracking | 4 | May 31, 2019 |
ZooEffect Plugin for Video player, Photo Gallery Slideshow jQuery and audio / music / podcast – HTML5 | 1 | November 30, 2011 |
ZoomSounds - WordPress Wave Audio Player with Playlist | 3 | August 30, 2021 |
Zotpress | 5 | May 7, 2024 |
ZX_CSV Upload | 1 | December 16, 2016 |
Zynith SEO | 3 | August 26, 2024 |
ZYREX POPUP | 1 | April 4, 2023 |
µAudio Player | 1 | May 25, 2014 |
Кнопка ЮMoney | 3 | July 18, 2023 |
ЮKassa для WooCommerce | 2 | July 29, 2022 |
افزونه پیامک ووکامرس Persian WooCommerce SMS | 2 | April 5, 2022 |
پلاگین پرداخت دلخواه | 2 | July 9, 2024 |
ووکامرس فارسی | 2 | August 9, 2024 |
తెలుగు బైబిల్ వచనములు | 1 | July 19, 2021 |
博客社交分享组件 | 2 | August 19, 2021 |
Did you know Wordfence Intelligence provides free personal and commercial API access to our comprehensive WordPress vulnerability database, along with a free webhook integration to stay on top of the latest vulnerabilities added and updated in the database? Get started today!
Learn moreWant to get notified of the latest vulnerabilities that may affect your WordPress site?
Install Wordfence on your site today to get notified immediately if your site is affected by a vulnerability that has been added to our database.
The Wordfence Intelligence WordPress vulnerability database is completely free to access and query via API. Please review the documentation on how to access and consume the vulnerability data via API.
Documentation