Vulnerability Disclosure Policy

As a provider of security software, services, and research, we take security issues very seriously and strive to lead by example. We recognize the importance of collaboration between vendors, researchers, and customers and seek to improve the safety and security of the community as a whole through a coordinated disclosure process.

This policy outlines the steps researchers should take to report security issues to Wordfence, as well as the process we use when disclosing vulnerabilities to other vendors.

Reporting Security Issues to Wordfence in WordPress Plugins, Themes, and Core for CVE Assignment.

Wordfence is a Certified Numbering Authority (CNA), which grants us the ability to assign CVE IDs to WordPress plugin, theme, and core vulnerabilities. Please fill out the CVE Request form located here to request a CVE ID in the following situations:

  • You have identified a security vulnerability in a WordPress plugin.
  • You have identified a security vulnerability in a WordPress theme.
  • You have identified a security vulnerability in a WordPress core.

The Wordfence Threat Intelligence team will review your submission and report back within 1-3 business days with a CVE ID assignment or a request for additional information. All CVE IDs assigned by Wordfence are listed on our site under Vulnerability Advisories and a guide to responsible disclosure can be found here.

If you have any questions, please send an email to cve-request@wordfence.com.

Reporting Security Issues in Wordfence Products to Wordfence

Contact the Wordfence Security Team by sending email to security@wordfence.com in the following situations:

  • You have identified a potential security vulnerability with one of our products;
  • You have identified a potential security vulnerability with one of our services.

To ensure confidentiality, we encourage you to encrypt any sensitive information you send to us via email. We are equipped to receive messages encrypted using our public PGP key.

After your incident report is received, the appropriate personnel will contact you to follow-up. Wordfence attempts to acknowledge receipt to all submitted reports within seven days.

The security@wordfence.com email address is intended ONLY for the purposes of reporting product or service security vulnerabilities. It is not for technical support. All content other than that specific to security vulnerabilities in our products or services will be dropped. For technical and customer support inquiries, please visit https://support.wordfence.com.

Software Vulnerability Disclosure and Remediation Process

When the Wordfence Threat Intelligence Team finds a vulnerability in another vendor’s product, or if a vulnerability affecting our plugin is disclosed to us, we take the following steps to address the issue. “Vendor” below may refer to us, an external vendor, or the security team of any repository or platform hosting the software.

  1. Our Threat Intelligence team verifies the vulnerability and determines severity.
  2. Where possible, we develop a firewall rule to protect our customers. This rule is obfuscated to prevent reverse engineering.
  3. We notify the vendor, if necessary, and simultaneously release a firewall rule to protect our premium customers via the Threat Defense Feed. Customer sites are updated immediately with the rule and no customer action is required.
  4. Details of the vulnerability may be published after the following deadlines, based on the date the vendor was notified:
    1. 30 days if vendor acknowledges our report within 14 days of initial contact
    2. 14 days if vendor does not acknowledge our report within 14 days of initial contact
    3. At our discretion if the vulnerability is being actively exploited to inform and protect the WordPress community
    4. At our discretion if the software has been closed to downloads or sales with an open security issue, to inform and protect the WordPress community from vulnerabilities that have no available patches
    5. If a deadline would fall on a weekend or holiday, the deadline will be placed on the earliest following business day
  5. Once the vendor releases a fix, or a disclosure deadline is reached, we announce the existence of the vulnerability to encourage the community to upgrade.
  6. Wordfence community (free) customers receive the firewall rule 30 days after the initial release to Premium, Care and Response customers.

All aspects of this process are subject to change without notice, and to case-by-case exceptions.

Service Vulnerability Disclosure Policy

We define a service vulnerability as any issue with a technology service that represents an exploitable security risk for its users. We draw a distinction between service and software vulnerabilities, because in many cases, the service vulnerability is due to configuration issues instead of a software bug.
When the Wordfence Security Services Team discovers a security vulnerability in a service, such as WordPress hosting, we take the following steps to address the issue:

  1. Our Threat Intelligence team verifies the vulnerability and determines severity.
  2. Details of the vulnerability may be published after the following deadlines, based on the date the vendor was notified:
    • 30 days if vendor acknowledges our report within 14 days of initial contact
    • 14 days if vendor does not acknowledge our report within 14 days of initial contact
    • At our discretion if the vulnerability is being actively exploited to inform and protect the WordPress community
    • If a deadline would fall on a weekend or holiday, the deadline will be placed on the earliest following business day
  3. Where this service vulnerability directly affects a customer, we may notify that customer if there are actions they can take to remediate the issue and/or consider changing hosting providers. We will not provide technical details of the service vulnerability until we disclose publicly.
  4. The service provider releases a fix or the deadline passes, and we announce the vulnerability via our blog.

All aspects of this process are subject to change without notice, and to case-by-case exceptions.