🦸 Calling all superheroes! Introducing the WordPress Superhero Challenge for the Wordfence Bug Bounty Program: Earn up to $31,200 for High Impact Vulnerabilities! Through October 14th, 2024, all vulnerabilities reported in plugins or themes with >= 5,000,000 active installs will be 3x our highest bounty rewards making our top reward $31,200. Check out the updated bounties here!
Title | Number of Vulnerabilities | Last Vulnerability |
---|---|---|
Five Star Business Profile and Schema | 1 | January 18, 2022 |
Five Star Restaurant Reviews | 1 | February 2, 2024 |
Fix My Feed RSS Repair | 1 | December 5, 2023 |
Fixed HTML Toolbar | 1 | April 15, 2024 |
Fixedly Media Gallery | 1 | July 7, 2014 |
Flagallery-skins | 1 | May 22, 2013 |
FlagEm | 1 | July 22, 2013 |
Flamingo | 1 | January 15, 2020 |
Flamix: Bitrix24 and Contact Form 7 integrations | 1 | August 20, 2024 |
FLASH PLAYER PLUGIN | 1 | July 15, 2015 |
Flash Video Player | 1 | April 15, 2024 |
flash-photo-gallery | 1 | April 25, 2014 |
flash-player-widget | 1 | December 30, 2013 |
Flattr | 1 | May 2, 2024 |
Flex Local Fonts | 1 | November 15, 2021 |
Flexi – Guest Submit | 1 | February 16, 2022 |
Flexible Captcha | 1 | January 11, 2023 |
Flexible Custom Post Type | 1 | November 17, 2011 |
Flexible Elementor Panel | 1 | February 2, 2023 |
Flexible FAQs – Accordion FAQ Plugin for WordPress | 1 | July 18, 2023 |
Did you know Wordfence Intelligence provides free personal and commercial API access to our comprehensive WordPress vulnerability database, along with a free webhook integration to stay on top of the latest vulnerabilities added and updated in the database? Get started today!
Learn moreWant to get notified of the latest vulnerabilities that may affect your WordPress site?
Install Wordfence on your site today to get notified immediately if your site is affected by a vulnerability that has been added to our database.
The Wordfence Intelligence WordPress vulnerability database is completely free to access and query via API. Please review the documentation on how to access and consume the vulnerability data via API.
Documentation