Descripción
This plugin integrates with the WPVulnerability API to provide real-time vulnerability assessments for your WordPress core, plugins, themes, PHP version, Apache HTTPD, nginx, MariaDB, MySQL, ImageMagick, curl, memcached, Redis, and SQLite.
It delivers detailed reports directly within your WordPress dashboard, helping you stay aware of potential security risks. Configure the plugin to send periodic notifications about your site’s security status, ensuring you remain informed without being overwhelmed. Designed for ease of use, it supports proactive security measures without storing or retrieving any personal data from your site.
Fiabilidad de los datos
La información proporcionada por la base de datos proviene de diferentes fuentes que han sido revisadas por terceros. No existe ningún tipo de responsabilidad sobre la información. Actúa por tu cuenta y riesgo.
Using the plugin
WP-CLI
You can use the following WP-CLI commands to manage and check vulnerabilities:
- Core:
wp wpvulnerability core
- Plugins:
wp wpvulnerability plugins
- Themes:
wp wpvulnerability themes
- PHP:
wp wpvulnerability php
- Apache HTTPD:
wp wpvulnerability apache
- nginx:
wp wpvulnerability nginx
- MariaDB:
wp wpvulnerability mariadb
- MySQL:
wp wpvulnerability mysql
- ImageMagick:
wp wpvulnerability imagemagick
- curl:
wp wpvulnerability curl
- memcached:
wp wpvulnerability memcached
- Redis:
wp wpvulnerability redis
- SQLite:
wp wpvulnerability sqlite
All commands support the --format
option to specify the output format:
--format=table
: Displays the results in a table format (default).--format=json
: Displays the results in JSON format.
Need help?
wp wpvulnerability --help
: Displays help information for WPVulnerability commands.wp wpvulnerability [command] --help
: Displays help information for a WPVulnerability command.
REST API
The WPVulnerability plugin provides several REST API endpoints to fetch vulnerability information for different components of your WordPress site.
- Core:
/wpvulnerability/v1/core
- Plugins:
/wpvulnerability/v1/plugins
- Themes:
/wpvulnerability/v1/themes
- PHP:
/wpvulnerability/v1/php
- Apache HTTPD:
/wpvulnerability/v1/apache
- nginx:
/wpvulnerability/v1/nginx
- MariaDB:
/wpvulnerability/v1/mariadb
- MySQL:
/wpvulnerability/v1/mysql
- ImageMagick:
/wpvulnerability/v1/imagemagick
- curl:
/wpvulnerability/v1/curl
- memcached:
/wpvulnerability/v1/memcached
- Redis:
/wpvulnerability/v1/redis
- SQLite:
/wpvulnerability/v1/sqlite
The WPVulnerability REST API uses Application Passwords for authentication. You need to include a valid Application Password in the Authorization header of your requests.
Example Request with Authentication
curl -X GET https://example.com/wp-json/wpvulnerability/v1/plugins -u username:application_password
Replace username with your WordPress username
and application_password
with your Application Password.
Extra Configurations
«From:» mail (since: 3.2.2)
If, for some reason, you need the emails sent by the plugin to have a From different from the site administrator, you can change it from the wp-config.php
by adding a constant:
define( 'WPVULNERABILITY_MAIL', 'sender@example.com' );
If the constant is active, it will be visible in the configuration screen.
Compatibility
- WordPress: 4.1 – 6.7
- PHP: 5.6 – 8.4
- WP-CLI: 2.3.0 – 2.11.0
Security
This plugin adheres to the following security measures and review protocols for each version:
- WordPress Plugin Handbook
- WordPress Plugin Security
- WordPress APIs Security
- WordPress Coding Standards
- Plugin Check (PCP)
- SonarCloud Code Review
Privacy
- This plugin or the WordPress Vulnerability Database API does not collect any information about your site, your identity, the plugins, themes or content the site has.
Vulnerabilities
- No vulnerabilities have been published up to version 4.0.2.
Found a security vulnerability? Please report it to us privately at the WPVulnerability GitHub repository.
Contributors
You can contribute to this plugin at the WPVulnerability GitHub repository.
Capturas
Instalación
Descarga automática
Visita la sección de plugins en tu WordPress, busca [wpvulnerability] y descarga e instala el plugin.
Descarga manual
Extrae el contenido del ZIP y sube el contenido al directorio /wp-content/plugins/wpvulnerability/
. Una vez subido, aparecerá en tu lista de plugins.
Preguntas frecuentes
-
¿De dónde procede la información sobre vulnerabilidades?
-
El origen está en la API de WPVulnerability.com. Las vulnerabilidades que aparecen en esta API provienen de diferentes fuentes, como los CVE.
-
¿Se envían los datos de mi sitio a alguna parte?
-
No. Nunca. Tu privacidad es muy importante para nosotros. No comerciamos con tus datos.
-
¿Qué vulnerabilidades voy a encontrar?
-
Vulnerabilities in WordPress Core, Plugins, Themes, PHP, Apache HTTPD, nginx, MariaDB, MySQL, ImageMagick, curl, memcached, Redis, and SQLite are documented.
-
¿Qué hago si mi sitio tiene una vulnerabilidad?
-
First of all, peace of mind. Investigate what the vulnerability is and, above all, check that you have the latest version of the compromised element. We actively recommend that you keep all your WordPress and its plugins up to date. Contact your hosting provider to patch non-WordPress vulnerabilities (like web server, databases, and other software).
Reseñas
Colaboradores y desarrolladores
«WPVulnerability» es un software de código abierto. Las siguientes personas han colaborado con este plugin.
Colaboradores«WPVulnerability» ha sido traducido a 13 idiomas locales. Gracias a los traductores por sus contribuciones.
Traduce «WPVulnerability» a tu idioma.
¿Interesado en el desarrollo?
Revisa el código , echa un vistazo al repositorio SVN o suscríbete al registro de desarrollo por RSS.
Registro de cambios
[4.0.3] – 2024-10-28
- Recreation of the 4.0.2 version. Something did not created the 4.0.2 version.
[4.0.2] – 2024-10-25
Fixed
- ImageMagick: it crashes in some cases where the hosting does not have ImageMagick.
Compatibility
- WordPress: 4.1 – 6.7
- PHP: 5.6 – 8.4
- WP-CLI: 2.3.0 – 2.11.0
Tests
- PHP Coding Standards: 3.10.3
- WordPress Coding Standards: 3.1.0
- Plugin Check (PCP): 1.1.0
- SonarCloud Code Review
[4.0.1] – 2024-10-04
Fixed
- API endpoints: some API endpoints were failing.
- CLI endpoints: some CLI endpoints were failing.
Compatibility
- WordPress: 4.1 – 6.7
- PHP: 5.6 – 8.4
- WP-CLI: 2.3.0 – 2.11.0
Tests
- PHP Coding Standards: 3.10.3
- WordPress Coding Standards: 3.1.0
- Plugin Check (PCP): 1.1.0
- SonarCloud Code Review
[4.0.0] – 2024-10-01
Added
- ImageMagic vulnerabilities (Site Health + WP-CLI + API + mail).
- curl vulnerabilities (Site Health + WP-CLI + API + mail).
- memcached vulnerabilities (Site Health + WP-CLI + API + mail).
- Redis vulnerabilities (Site Health + WP-CLI + API + mail).
- SQLite vulnerabilities (Site Health + WP-CLI + API + mail).
Fixed
- Test email without email.
- Improved MariaDB 11.x detection.
- Improved versions detection (major-minor.patch-build).
- WordPress < 5.3: use of wp_date().
- WordPress < 5.0: locale detection.
- Dashboard widget only for users with capabilities.
- WordPress < 5.2: link to Site Health
Changed
- Big refactory.
- Less files, less size, improved code quality.
Compatibility
- WordPress: 4.1 – 6.7
- PHP: 5.6 – 8.4
- WP-CLI: 2.3.0 – 2.11.0
Tests
- Manual Testing:
- WordPress 6.7 / PHP 8.4
- WordPress 6.6 / PHP 8.3
- WordPress 6.4 / PHP 8.2
- WordPress 6.1 / PHP 8.1
- WordPress 5.8 / PHP 8.0
- WordPress 5.5 / PHP 7.4
- WordPress 5.3 / PHP 7.3
- WordPress 4.9 / PHP 7.2
- WordPress 4.8 / PHP 7.1
- WordPress 4.6 / PHP 7.0
- WordPress 4.1 / PHP 5.6
- PHP Coding Standards: 3.10.3
- WordPress Coding Standards: 3.1.0
- Plugin Check (PCP): 1.1.0
- SonarCloud Code Review
Previous versions
If you want to see the full changelog, visit the changelog.txt file.