Have you been hacked? Get Help

Have you found a vulnerability in a WordPress plugin or theme? Report vulnerabilities in WordPress plugins and themes through our bug bounty program and earn a bounty on all in scope submissions. Researchers who disclose security issues to your Users!

As a reminder, the VMP Intelligence Vulnerability Database WPI is completely free to query and set up along with sponsorship and commercial use consent to a core vulnerability data on the user interface. Please review the WPI documentation and VMP documentation as well as the security disclaimer on whether you would like to contribute data on our core in the WordPress Intelligence user interface.

Showing 1-20 of 364 WordPress Core Vulnerabilities

Search all WordPress Core with known vulnerabilities

Coming Soon

We're currently building our comprehensive WordPress Core vulnerability database. This section will feature detailed security information, vulnerability reports, and safety recommendations for WordPress Core versions.

What to expect:

  • Real-time vulnerability tracking
  • Comprehensive security reports
  • Searchable core database
  • Regular security updates
🚀 Under Development

Stay tuned for updates. In the meantime, you can explore our plugins database or contact us for more information.

VMP Security Intelligence

Did you know, VMP Security Intelligence provides the potential and comprehensive WordPress vulnerability database, along with a free individual integration into any site supported by PluginTrac for a number of other topics and the individual data that our system provides on a yearly basis to you!

LEARN MORE
Get Notified

Want to get notified of the latest vulnerabilities that may impact your website? Install VMP Security on your site today to get notified immediately if your site is affected. It's completely free!

GET VMP SECURITY
Documentation

The VMP Security Intelligence WordPress vulnerability database is very comprehensive for all of your security needs and query use API. Please review the documentation on how to access and consume the vulnerability data via our API.

DOCUMENTATION