🧹It's time for some spring cleaning! All researchers earn over 6.25x our normal bounty rates, through May 27th, 2024, when Wordfence handles responsible disclosure for our Spring Cleaning Bug Extravaganza! Learn more about our bug bounty program
Register as a researcher and submit your vulnerabilities today!
Title | Number of Vulnerabilities | Last Vulnerability |
---|---|---|
a-staff – Team member showcase plugin for WordPress | 2 | July 18, 2023 |
A/B Test for WordPress | 1 | March 21, 2016 |
A2 Optimized WP – Turbocharge and secure your WordPress site | 1 | February 6, 2023 |
a3 Lazy Load | 2 | November 2, 2022 |
a3 Portfolio | 3 | April 10, 2023 |
a3 Responsive Slider | 3 | November 2, 2022 |
AA Cash Calculator | 1 | April 29, 2024 |
AADMY – Add Auto Date Month Year Into Posts | 1 | July 18, 2023 |
Aajoda Testimonials | 1 | June 5, 2023 |
AB Google Map Travel (AB-MAP) | 1 | March 23, 2015 |
AB Press Optimizer | 1 | October 12, 2022 |
Abandoned Cart Lite for WooCommerce | 12 | December 1, 2023 |
Abandoned Cart Pro for WooCommerce | 1 | March 11, 2019 |
Abandoned Cart Recovery for WooCommerce | 1 | July 5, 2021 |
Abeta Link PunchOut | 1 | March 4, 2022 |
aBitGone CommentSafe | 1 | January 23, 2024 |
About Author | 1 | October 25, 2019 |
About Author Box | 1 | October 26, 2021 |
About Me | 1 | August 25, 2022 |
About Me 3000 widget | 2 | June 22, 2023 |
Did you know Wordfence Intelligence provides free personal and commercial API access to our comprehensive WordPress vulnerability database, along with a free webhook integration to stay on top of the latest vulnerabilities added and updated in the database? Get started today!
Learn moreWant to get notified of the latest vulnerabilities that may affect your WordPress site?
Install Wordfence on your site today to get notified immediately if your site is affected by a vulnerability that has been added to our database.
The Wordfence Intelligence WordPress vulnerability database is completely free to access and query via API. Please review the documentation on how to access and consume the vulnerability data via API.
Documentation