Title: WPVulnerability
Author: Javier Casares
Published: <strong>06.05.2022</strong>
Last modified: 20.01.2026

---

Поиск плагинов

![](https://ps.w.org/wpvulnerability/assets/banner-772x250.png?rev=3387690)

![](https://ps.w.org/wpvulnerability/assets/icon.svg?rev=3387690)

# WPVulnerability

 Автор: [Javier Casares](https://profiles.wordpress.org/javiercasares/)

[Скачать](https://downloads.wordpress.org/plugin/wpvulnerability.4.3.1.zip)

 * [Детали](https://ru.wordpress.org/plugins/wpvulnerability/#description)
 * [Отзывы](https://ru.wordpress.org/plugins/wpvulnerability/#reviews)
 *  [Установка](https://ru.wordpress.org/plugins/wpvulnerability/#installation)
 * [Разработка](https://ru.wordpress.org/plugins/wpvulnerability/#developers)

 [Поддержка](https://wordpress.org/support/plugin/wpvulnerability/)

## Описание

This plugin integrates with the WPVulnerability API to provide real-time vulnerability
assessments for your WordPress core, plugins, themes, PHP version, Apache HTTPD,
nginx, MariaDB, MySQL, ImageMagick, curl, memcached, Redis, and SQLite.

It delivers detailed reports directly within your WordPress dashboard, helping you
stay aware of potential security risks. Configure the plugin to send periodic notifications
about your site’s security status, ensuring you remain informed without being overwhelmed.
Designed for ease of use, it supports proactive security measures without storing
or retrieving any personal data from your site.

#### Data reliability

The information provided by the information database comes from different sources
that have been reviewed by third parties. There is no liability of any kind for 
the information. Act at your own risk.

### Using the plugin

#### WP-CLI

You can use the following WP-CLI commands to manage and check vulnerabilities:

 * Core: `wp wpvulnerability core`
 * Plugins: `wp wpvulnerability plugins`
 * Themes: `wp wpvulnerability themes`
 * PHP: `wp wpvulnerability php`
 * Apache HTTPD: `wp wpvulnerability apache`
 * nginx: `wp wpvulnerability nginx`
 * MariaDB: `wp wpvulnerability mariadb`
 * MySQL: `wp wpvulnerability mysql`
 * ImageMagick: `wp wpvulnerability imagemagick`
 * curl: `wp wpvulnerability curl`
 * memcached: `wp wpvulnerability memcached`
 * Redis: `wp wpvulnerability redis`
 * SQLite: `wp wpvulnerability sqlite`

To configure the plugin you can use:

 * Hide component: `wp wpvulnerability config hide <component> [on|off]`
 * Notification email: `wp wpvulnerability config email <emails>` (comma separatted)
 * Notification period: `wp wpvulnerability config period <never|daily|weekly>`
 * Log retention: `wp wpvulnerability config log-retention <0|1|7|14|28>` (in days)
 * Cache duration: `wp wpvulnerability config cache <1|6|12|24>` (in hours)

All commands support the `--format` option to specify the output format:

 * `--format=table`: Displays the results in a table format (default).
 * `--format=json`: Displays the results in JSON format.

Need help?

 * `wp wpvulnerability --help`: Displays help information for WPVulnerability commands.
 * `wp wpvulnerability [command] --help`: Displays help information for a WPVulnerability
   command.

#### REST API

The WPVulnerability plugin provides several **REST API endpoints** to fetch vulnerability
information for different components of your WordPress site.

 * Core: `/wpvulnerability/v1/core`
 * Plugins: `/wpvulnerability/v1/plugins`
 * Themes: `/wpvulnerability/v1/themes`
 * PHP: `/wpvulnerability/v1/php`
 * Apache HTTPD: `/wpvulnerability/v1/apache`
 * nginx: `/wpvulnerability/v1/nginx`
 * MariaDB: `/wpvulnerability/v1/mariadb`
 * MySQL: `/wpvulnerability/v1/mysql`
 * ImageMagick: `/wpvulnerability/v1/imagemagick`
 * curl: `/wpvulnerability/v1/curl`
 * memcached: `/wpvulnerability/v1/memcached`
 * Redis: `/wpvulnerability/v1/redis`
 * SQLite: `/wpvulnerability/v1/sqlite`

The WPVulnerability REST API uses **Application Passwords** for authentication. 
You need to include a valid Application Password in the Authorization header of 
your requests.

Example Request with Authentication

    ```
    curl -X GET https://example.com/wp-json/wpvulnerability/v1/plugins -u username:application_password
    ```

Replace username with your WordPress `username` and `application_password` with 
your [Application Password](https://make.wordpress.org/core/2020/11/05/application-passwords-integration-guide/).

### Extra Configurations

#### «From:» mail (since: 3.2.2)

If, for some reason, you need the emails sent by the plugin to have a From different
from the site administrator, you can change it from the `wp-config.php` by adding
a constant:

    ```
    define( 'WPVULNERABILITY_MAIL', 'sender@example.com' );
    ```

If the constant is active, it will be visible in the configuration screen.

#### Force hiding checks (since: 4.1.0)

If you want to always hide a specific component, you can define a constant in `wp-
config.php`. When set to `true`, the option will be checked automatically in the
settings screen and the related analysis will be skipped.

Example:

    ```
    define( 'WPVULNERABILITY_HIDE_APACHE', true );
    ```

Available constants: `WPVULNERABILITY_HIDE_CORE`, `WPVULNERABILITY_HIDE_PLUGINS`,`
WPVULNERABILITY_HIDE_THEMES`, `WPVULNERABILITY_HIDE_PHP`, `WPVULNERABILITY_HIDE_APACHE`,`
WPVULNERABILITY_HIDE_NGINX`, `WPVULNERABILITY_HIDE_MARIADB`, `WPVULNERABILITY_HIDE_MYSQL`,`
WPVULNERABILITY_HIDE_IMAGEMAGICK`, `WPVULNERABILITY_HIDE_CURL`, `WPVULNERABILITY_HIDE_MEMCACHED`,`
WPVULNERABILITY_HIDE_REDIS`, `WPVULNERABILITY_HIDE_SQLITE`.

#### Cache duration (since: 4.1.0)

By default, data from the API is cached for 12 hours. To change this, define `WPVULNERABILITY_CACHE_HOURS`
in `wp-config.php` with one of `1`, `6`, `12` or `24`. This value overrides the 
setting screen and WP-CLI command.

    ```
    define( 'WPVULNERABILITY_CACHE_HOURS', 24 );
    ```

#### Log rotation (since: 4.2.0)

WPVulnerability stores the most recent API responses so you can review recent calls
from the new log tab. Define `WPVULNERABILITY_LOG_RETENTION_DAYS` in `wp-config.
php` to control how many days of entries are preserved. Supported values are `0`,`
1`, `7`, `14` or `28`; using `0` disables logging entirely.

    ```
    define( 'WPVULNERABILITY_LOG_RETENTION_DAYS', 14 );
    ```

When the constant is present its value is enforced in the settings UI and through
WP-CLI, ensuring consistent log rotation across environments.

#### Security configuration (since: 4.3.0)

WPVulnerability uses a hybrid detection approach for server software (ImageMagick,
Redis, Memcached, SQLite): PHP extensions first (most secure), then shell commands
as fallback (most accurate). You can control this behavior using security configuration
constants in `wp-config.php`.

**Global disable of shell commands:**

    ```
    define( 'WPVULNERABILITY_DISABLE_SHELL_EXEC', true );
    ```

Completely disables shell command usage. Falls back to PHP extensions only. Use 
for maximum security when accuracy loss is acceptable.

**Security mode (standard/strict/disabled):**

    ```
    define( 'WPVULNERABILITY_SECURITY_MODE', 'strict' );
    ```

 * `standard` — Hybrid detection: PHP extensions first, shell commands fallback (
   default, best accuracy)
 * `strict` — PHP extensions only, no shell commands (high security, lower accuracy)
 * `disabled` — No software detection at all (maximum security)

**Component whitelist:**

    ```
    define( 'WPVULNERABILITY_SHELL_EXEC_WHITELIST', 'imagemagick,redis' );
    ```

Allows shell commands only for specified components. Available components: `imagemagick`,`
redis`, `memcached`, `sqlite`. Use for granular control.

**Examples:**

Maximum security (no shell commands):

    ```
    define( 'WPVULNERABILITY_SECURITY_MODE', 'strict' );
    ```

Only allow ImageMagick shell detection:

    ```
    define( 'WPVULNERABILITY_SHELL_EXEC_WHITELIST', 'imagemagick' );
    ```

Complete disable:

    ```
    define( 'WPVULNERABILITY_DISABLE_SHELL_EXEC', true );
    ```

All shell commands are hardcoded and validated — no user input is involved. Commands
are logged for security auditing.

### Compatibility

 * WordPress: 4.7 — 6.9
 * PHP: 5.6 — 8.5
 * WP-CLI: 2.3.0 — 2.11.0

### Безопасность

This plugin adheres to the following security measures and review protocols for 
each version:

 * [WordPress Plugin Handbook](https://developer.wordpress.org/plugins/)
 * [WordPress Plugin Security](https://developer.wordpress.org/plugins/wordpress-org/plugin-security/)
 * [WordPress APIs Security](https://developer.wordpress.org/apis/security/)
 * [WordPress Coding Standards](https://github.com/WordPress/WordPress-Coding-Standards)
 * [Plugin Check (PCP)](https://wordpress.org/plugins/plugin-check/)

### Конфиденциальность

 * This plugin or the WordPress Vulnerability Database API does not collect any 
   information about your site, your identity, the plugins, themes or content the
   site has.

### Vulnerabilities

 * A security vulnerability was found and fixed in version 4.2.2.1. All previous
   versions (3.3.0 — 4.2.1) are affected. Please update to version 4.2.2.1 or later.

Found a security vulnerability? Please report it to us privately at the [WPVulnerability GitHub repository](https://github.com/javiercasares/wpvulnerability/security/advisories/new).

### Contributors

You can contribute to this plugin at the [WPVulnerability GitHub repository](https://github.com/javiercasares/wpvulnerability).

## Скриншоты

 * [[
 * WP-Admin Dashboard widget.
 * [[
 * Vulnerability list at Plugins list.
 * [[
 * Vulnerability list at Site Health.

## Установка

#### Automatic download

Visit the plugin section in your WordPress, search for [wpvulnerability]; download
and install the plugin.

#### Manual download

Extract the contents of the ZIP and upload the contents to the `/wp-content/plugins/
wpvulnerability/` directory. Once uploaded, it will appear in your plugin list.

## Часто задаваемые вопросы

### Where does the vulnerability information come from?

The origin is in the WPVulnerability.com API. The vulnerabilities that appear in
this API come from different sources, such as CVEs.

### Is data from my site sent anywhere?

No. Never. Your privacy is very important to us. We do not commercialize with your
data.

### What vulnerabilities will I find?

Vulnerabilities in WordPress Core, Plugins, Themes, PHP, Apache HTTPD, nginx, MariaDB,
MySQL, ImageMagick, curl, memcached, Redis, and SQLite are documented.

### What do I do if my site has a vulnerability?

First of all, peace of mind. Investigate what the vulnerability is and, above all,
check that you have the latest version of the compromised element. We actively recommend
that you keep all your WordPress and its plugins up to date. Contact your hosting
provider to patch non-WordPress vulnerabilities (like web server, databases, and
other software).

## Отзывы

![](https://secure.gravatar.com/avatar/01a4d1de8bdc699d5b30bebea22dbfb690d1fc526025b757faaf5746ddce837f?
s=60&d=retro&r=g)

### 󠀁[Wow, most useful wordpress plugin for security!](https://wordpress.org/support/topic/wow-most-useful-wordpress-plugin-for-security/)󠁿

 [Bubalubs](https://profiles.wordpress.org/bubalubs/) 28.01.2025 1 ответ

It is a must have install on every WP project for security and maintaince! 🙂 Backed
up by a open API that shares vulnerabilities. Thank you! 😊

![](https://secure.gravatar.com/avatar/6781e84707046fa72f9227dbc9acbcfdae4b32cef8df4331dbb55e778a72a9f3?
s=60&d=retro&r=g)

### 󠀁[Essential plugin](https://wordpress.org/support/topic/essential-plugin-252/)󠁿

 [Dan Bamber](https://profiles.wordpress.org/danbamber/) 28.01.2025 1 ответ

Without a doubt, the most important plugin to install on your WordPress instance.

![](https://secure.gravatar.com/avatar/694af5784d386616f5b9fa898c055fe7f101258d140919833a024992451ade95?
s=60&d=retro&r=g)

### 󠀁[Mi herramienta principal de diagnóstico](https://wordpress.org/support/topic/mi-herramienta-principal-de-diagnostico/)󠁿

 [Lolo Marchal](https://profiles.wordpress.org/chipweb/) 28.05.2024

Resume en un solo plugin todas las vulnerabilidades tu WordPress, Plugins y Themes.
Para mi es un «musthave» desde hace más de 1 año. Lo instalo en todas mis auditorías.

![](https://secure.gravatar.com/avatar/87655adbe9c370936dcf446c1d77671f70f39b634917183c7fb97ac4098a95fc?
s=60&d=retro&r=g)

### 󠀁[This is awesome](https://wordpress.org/support/topic/this-is-awesome-121/)󠁿

 [pixluser](https://profiles.wordpress.org/pixluser/) 17.04.2024

Vulnerabilities are listed into your plugins list.You should also being able to 
receive an automatic email too. It doesn’t work on my system, but email test yes.
So awesome plugin anyway!

![](https://secure.gravatar.com/avatar/35745cbb4065201434c30aad2e5980133a6a987f4dbbba485c04da8d57601f26?
s=60&d=retro&r=g)

### 󠀁[Perfect](https://wordpress.org/support/topic/perfect-10327/)󠁿

 [Groovyx9](https://profiles.wordpress.org/groovyx9/) 08.04.2024 1 ответ

Exactly what I was looking for ! On the roadmap, it would be nice if : we can chose
if we want to receive an email OR not (I may use it as a vuln reminder on the dashboard,
as I have other plugins already keeping me informed) we can chose what will be in
the email — php or not for exemple (it seems that it is planned, thanks) only receive
an email if one the vuln is considered high risk etc.

![](https://secure.gravatar.com/avatar/f2949e1420c186ba7fe9eafb8f5c406b6b29ddebb639e7c7da6f93d39b784643?
s=60&d=retro&r=g)

### 󠀁[Must have](https://wordpress.org/support/topic/must-have-700/)󠁿

 [Martin Sauter](https://profiles.wordpress.org/martinsauter/) 21.02.2024

This plugin alerts you about known vulnerabilities in your WordPress core, plugins,
themes, and even PHP, so you can take action in a timely manner. If you don’t have
this plugin on your site already, you absolutely need it!

 [ Посмотреть все 19 отзывов ](https://wordpress.org/support/plugin/wpvulnerability/reviews/)

## Участники и разработчики

«WPVulnerability» — проект с открытым исходным кодом. В развитие плагина внесли 
свой вклад следующие участники:

Участники

 *   [ Javier Casares ](https://profiles.wordpress.org/javiercasares/)
 *   [ David Perez ](https://profiles.wordpress.org/davidperez/)
 *   [ Lucas Bonomo ](https://profiles.wordpress.org/lbonomo/)
 *   [ Alex Lion (阿力獅) ](https://profiles.wordpress.org/alexclassroom/)

«WPVulnerability» переведён на 14 языков. Благодарим [переводчиков](https://translate.wordpress.org/projects/wp-plugins/wpvulnerability/contributors)
за их работу.

[Перевести «WPVulnerability» на ваш язык.](https://translate.wordpress.org/projects/wp-plugins/wpvulnerability)

### Заинтересованы в разработке?

[Посмотрите код](https://plugins.trac.wordpress.org/browser/wpvulnerability/), проверьте
[SVN репозиторий](https://plugins.svn.wordpress.org/wpvulnerability/), или подпишитесь
на [журнал разработки](https://plugins.trac.wordpress.org/log/wpvulnerability/) 
по [RSS](https://plugins.trac.wordpress.org/log/wpvulnerability/?limit=100&mode=stop_on_copy&format=rss).

## Журнал изменений

#### [4.3.1] — 2026-01-20

**Fixed**

 * Dashboard widget now correctly counts only vulnerabilities from enabled components,
   excluding disabled ones from settings.
 * Status badge calculation (Critical/Warning) now properly considers only enabled
   components when determining severity level.
 * Fixed PHPCS warnings for global variables without plugin prefix in wpvulnerability-
   admin.php and wpvulnerability-adminms.php.

**Compatibility**

 * WordPress: 4.7 — 6.9
 * PHP: 5.6 — 8.5
 * WP-CLI: 2.3.0 — 2.11.0

**Tests**

 * PHP Coding Standards: 3.13.5
 * WordPress Coding Standards: 3.3.0
 * Plugin Check (PCP): 1.8.0

#### [4.3.0] — 2026-01-19

**Highlights**

This major release brings a complete redesign of the admin interface, comprehensive
debugging tools, enhanced security, and new notification channels.

 * **Complete Admin Interface Redesign**: Modern card-based layout with visual component
   cards, improved spacing, color-coded status badges, and responsive grid layouts
   across all Settings tabs (Security, About, Logs, Tools, Analysis, and Notifications).
 * **New Debug Mode**: Comprehensive debugging tools visible when WP_DEBUG is enabled,
   including System Information, Component Detection with cache status, interactive
   API Testing with AJAX buttons, Configuration Summary, Cron Status with manual
   execution, Database Options Viewer, and Quick Actions (clear caches, reset signatures,
   export debug data as JSON). Includes enhanced web server detection for 9 different
   servers.
 * **Dashboard Widget Redesign**: Modern interface with prominent status badges (
   All Clear/Issues Found/Critical Issues Found), last check timestamp with human-
   readable format, empty state display with centered checkmark, separated component
   sections (WordPress Components vs Server Software), color-coded badges, and 2-
   column grid layout for server software.
 * **New Notification Channels**: Discord webhook support and Telegram bot integration
   for vulnerability notifications, with proper character limit handling and webhook
   URL validation.
 * **Enhanced Security**: CSRF protection via nonces for plugin/theme vulnerability
   filters, hybrid software detection system (PHP extensions first, shell commands
   as fallback), complete audit logging for shell executions, webhook URL validation
   with HTTPS enforcement and domain whitelisting, and new wp-config.php security
   constants.
 * **Multisite Improvements**: Fixed all form submission issues in Network Admin,
   proper nonce handling, correct URL generation with network_admin_url(), preserved
   settings when saving individual forms, and fixed Security tab with all required
   helper functions.
 * **Tools & Maintenance**: Cron event repair functionality for single sites and
   multisite networks, «Delete all logs» button, full plugin reset action, and improved
   cache management.

**Added**

 * Tools tab now lists expected WPVulnerability cron events, shows the scheduled
   instances, and lets administrators repair them on single sites.
 * Network Tools highlights unexpected WPVulnerability cron events on subsites and
   provides a one-click repair to clear and reschedule across the network.
 * Logs tab now includes a «Delete all logs» button to purge stored API log entries
   manually.
 * Hybrid software detection system: PHP extensions first (most secure), shell commands
   fallback (most accurate).
 * Four-level security control system for shell_exec usage with granular configuration.
 * Shell command validation with whitelist and dangerous pattern detection.
 * Complete audit logging for all shell executions (component, command, output, 
   user, IP, timestamp).
 * New wp-config.php constants: `WPVULNERABILITY_DISABLE_SHELL_EXEC`, `WPVULNERABILITY_SECURITY_MODE`,`
   WPVULNERABILITY_SHELL_EXEC_WHITELIST`.
 * Detection reliability scoring (0-100) for each software detection method.
 * Discord webhook support for vulnerability notifications with 2000-character limit
   handling.
 * Telegram bot support for vulnerability notifications with bot token and chat 
   ID configuration.
 * Documentation links for Discord webhook setup (https://support.discord.com/hc/
   articles/228383668).
 * Documentation links for Telegram bot setup (https://core.telegram.org/bots).
 * Debug tab (visible only when WP_DEBUG is enabled) providing comprehensive debugging
   tools for administrators.
 * wpvulnerability-debug.php file with 11 helper functions for debug functionality(
   ~18KB).
 * Debug Section 1: System Information displaying WordPress version, PHP version/
   extensions/memory, database type (MariaDB vs MySQL with proper detection), web
   server (nginx/Apache/LiteSpeed/OpenLiteSpeed/Caddy/IIS/Angie/OpenResty/Tengine),
   debug modes status, and debug log file information.
 * Debug log file information showing file path, size, and direct browser link when
   web-accessible.
 * Debug Section 2: Component Detection table listing all 13 components with detection
   status, version, analyzed state, and cache expiration time.
 * Debug Section 3: API Testing with interactive AJAX-powered buttons to test API
   connectivity for each component individually, showing HTTP status, response time,
   and data preview.
 * Debug Section 4: Configuration Summary displaying current plugin settings at 
   a glance.
 * Debug Section 5: Cron Status showing scheduled tasks with manual execution buttons(
   permission-gated with nonce verification).
 * Debug Section 6: Database Options Viewer with dropdown to inspect all stored 
   plugin options.
 * Debug Section 7: Quick Actions with buttons to clear all caches, reset plugin/
   theme signatures, and export debug information as JSON.
 * Enhanced web server detection supporting 9 different servers: nginx, Angie (nginx
   fork), Apache, LiteSpeed, OpenLiteSpeed, Caddy, IIS, OpenResty (nginx-based),
   and Tengine (nginx fork).
 * Three-level detection logic for web servers: (1) plugin’s standard function, (
   2) SERVER_SOFTWARE parsing, (3) shell commands as fallback.
 * Database detection properly distinguishes MariaDB from MySQL via version_comment
   SQL query.
 * AJAX handler `wpvulnerability_ajax_test_api()` for API testing with nonce verification
   and capability checks.
 * Debug helper functions: `wpvulnerability_debug_get_log_file_info()`, `wpvulnerability_debug_detect_webserver()`,`
   wpvulnerability_debug_get_system_info()`, `wpvulnerability_debug_get_component_status()`,`
   wpvulnerability_debug_test_api_component()`, `wpvulnerability_debug_get_cron_status()`,`
   wpvulnerability_debug_export_info()`, `wpvulnerability_debug_clear_all_caches()`,`
   wpvulnerability_debug_reset_signatures()`, `wpvulnerability_debug_get_option_names()`.
 * Debug tab POST handlers in both wpvulnerability-admin.php and wpvulnerability-
   adminms.php with nonce verification for all actions.
 * Debug tab render functions in wpvulnerability-admin.php: `wpvulnerability_render_admin_tab_debug()`,`
   wpvulnerability_render_debug_section_system_info()`, `wpvulnerability_render_debug_section_components()`,`
   wpvulnerability_render_debug_section_config()`, `wpvulnerability_render_debug_section_cron()`,`
   wpvulnerability_render_debug_section_api_testing()`, `wpvulnerability_render_debug_section_database_options()`,`
   wpvulnerability_render_debug_section_quick_actions()`.

**Безопасность**

 * Added CSRF protection via nonces for plugin vulnerability filter links to prevent
   forced navigation attacks.
 * Added CSRF protection via nonces for theme vulnerability filter links to prevent
   forced navigation attacks.
 * Plugin and theme filter URLs now include security nonces that are verified before
   applying filters.
 * Enhanced security against timing attacks on vulnerability enumeration by requiring
   valid nonces.
 * Enhanced ImageMagick, Redis, Memcached, and SQLite detection with hybrid approach
   and security controls.
 * All shell commands hardcoded and validated — no user input involved.
 * Shell execution wrapper with complete security checks and logging.
 * Webhook URLs now validated on save: enforces HTTPS and verifies hostname matches
   allowed domains (Slack: hooks.slack.com, Teams: office.com/office365.com/api.
   hooks.microsoft.com, Discord: discord.com/discordapp.com).
 * Telegram bot token validation with regex pattern check (format: 123456:ABC-DEF1234ghIkl-
   zyx57W2v1u123ew11).
 * Invalid webhook URLs and bot tokens are rejected with user-friendly error messages
   instead of silently failing on notification send.
 * Security audit score improved from 85/100 to 98/100 (comprehensive security audit
   completed 2026-01-19).

**Changed**

 * Database error hook now fires the prefixed `wpvulnerability_wpdb_last_error` 
   action while keeping the legacy hook deprecated.
 * Database update cron now follows the configured cache duration (hourly, 6h, 12h,
   or 24h).
 * Translations load on init to avoid early textdomain warnings.
 * Vulnerability data now refreshes only via scheduled cron or the manual reload
   action; admin requests, REST, CLI, notifications, and view rendering no longer
   trigger API calls to reduce load.
 * Cron scheduling no longer re-queues the update event on every page load; it keeps
   the configured interval (hourly/6h/12h/24h) unless the schedule changes.
 * REST API now requires administrator capabilities for session or application password
   access.
 * Admin reset and test email actions enforce admin capabilities.
 * API client timeouts corrected to 2.5 seconds to avoid long hangs.
 * Slack/Teams webhooks restricted to allowed HTTPS hosts to limit SSRF exposure.
 * Tools tab adds a full reset action that clears all plugin data, restores defaults,
   and reloads from the API.
 * Complete redesign of the admin settings interface with modern card-based layout
   for all tabs: Security, About, Logs, Tools, Analysis, and Notifications.
 * Settings tabs now feature visual component cards with icons, improved spacing,
   color-coded status badges, and responsive grid layouts for enhanced usability.
 * Complete redesign of the Dashboard widget with modern, clean interface replacing
   the basic list layout.
 * Dashboard widget now features prominent status badge with three states: «All 
   Clear» (green, 0 vulnerabilities), «X Issues Found» (yellow, minor issues), «
   X Critical Issues Found» (red, Core/PHP vulnerable or 5+ total vulnerabilities).
 * Dashboard widget displays last check timestamp with human-readable format («X
   minutes ago», «X hours ago») and «Refresh Now» link.
 * Dashboard widget shows attractive empty state with centered green checkmark when
   no vulnerabilities are detected.
 * Dashboard widget separates components into two clear sections: «WordPress Components»(
   Core, Plugins, Themes) and «Server Software» (PHP, web server, database, etc.).
 * Dashboard widget uses color-coded badges: green for secure (✓ 0), yellow/red 
   for vulnerabilities (✕ N) with consistent design.
 * Dashboard widget displays server software in 2-column grid layout for better 
   space utilization.
 * Dashboard widget shows vulnerable plugin/theme lists indented below their respective
   components.
 * Dashboard widget uses inline CSS with modern styling: flexbox layouts, proper
   spacing, WordPress admin color palette, improved typography (13px components,
   12px meta).
 * Dashboard widget footer includes links to Site Health and Settings with visual
   separation.
 * All CSS class names, HTML IDs, and JavaScript references changed from short prefix`.
   wpv-` to full prefix `.wpvulnerability-` to prevent naming conflicts with other
   plugins and themes (affects 73+ unique classes across admin panels).
 * All inline CSS from admin panels moved to external assets/admin.css file for 
   better performance and cacheability (~1084 lines extracted from 14 style blocks
   across single-site and multisite admin panels).
 * License updated from GPL2+ to GPL3+.

**Fixed**

 * Saving partial forms (e.g., log retention) no longer resets other notification
   settings to their defaults; existing values are preserved unless explicitly changed.
 * Network (adminms) settings now preserve existing values when saving individual
   forms and keep notification scheduling consistent.
 * Cache column in Component Detection (Debug tab) now correctly displays cache 
   expiration time by properly decoding JSON-encoded timestamps from database.
 * Database detection now properly distinguishes between MariaDB and MySQL instead
   of always showing «MySQL».
 * Multisite network admin forms (Notifications, Analysis, Configuration) now submit
   correctly by using proper network admin URLs and nonces instead of incompatible
   Settings API methods.
 * All form submission buttons in multisite admin now include proper `name` attribute(`
   wpvulnerability_submit`) for backend processing.
 * Delete logs form in multisite now uses `network_admin_url()` instead of single-
   site `admin_url()` for correct URL generation.
 * All multisite form nonce verifications now match their corresponding form nonce
   fields (reset, email, repair cron, delete logs) instead of using generic nonce.
 * Security tab in multisite network admin now works correctly by including all 
   required helper functions (wpvulnerability_display_security_status, wpvulnerability_display_detection_methods,
   wpvulnerability_display_security_logs) instead of calling undefined single-site
   functions.
 * Tools tab buttons in multisite network admin no longer show «nonce expired» errors
   by submitting forms to the same page (action=»») instead of explicit URL paths
   that fail referer validation.
 * Delete All Logs button in Logs tab no longer shows «The link you followed has
   expired» error by using empty form action (action=»») in both single-site and
   multisite admin panels.
 * Logs tab pagination now displays horizontally instead of vertically by properly
   targeting list elements (ul with inline-flex) and individual page links (a and
   span within li) to work correctly with WordPress paginate_links() ‘type’ => ‘
   list’ output.

**Compatibility**

 * WordPress: 4.7 — 6.9
 * PHP: 5.6 — 8.5
 * WP-CLI: 2.3.0 — 2.11.0

**Tests**

 * PHP Coding Standards: 3.13.5
 * WordPress Coding Standards: 3.3.0
 * Plugin Check (PCP): 1.8.0

#### [4.2.2.1] — 2026-01-16

**Безопасность**

 * Fixed authorization vulnerability in REST API endpoints that allowed low-privileged
   users to access sensitive vulnerability data. API now properly verifies user 
   capabilities (`manage_options` for single sites, `manage_network_options` for
   multisite) in addition to authentication.
 * Added direct access protection to wpvulnerability-api.php to prevent direct file
   execution outside WordPress context.

**Compatibility**

 * WordPress: 4.7 — 6.9
 * PHP: 5.6 — 8.4
 * WP-CLI: 2.3.0 — 2.11.0

**Tests**

 * PHP Coding Standards: 3.13.5
 * WordPress Coding Standards: 3.3.0
 * Plugin Check (PCP): 1.8.0

#### [4.2.1] — 2025-12-17

**Fixed**

 * Clear legacy WPVulnerability cron events from multisite subsites so updates and
   log cleanup only run on the main site.

**Compatibility**

 * WordPress: 4.7 — 6.9
 * PHP: 5.6 — 8.4
 * WP-CLI: 2.3.0 — 2.11.0

**Tests**

 * PHP Coding Standards: 3.13.5
 * WordPress Coding Standards: 3.3.0
 * Plugin Check (PCP): 1.7.0

#### Previous versions

If you want to see the full changelog, visit the [changelog.txt](https://plugins.trac.wordpress.org/browser/wpvulnerability/trunk/changelog.txt)
file.

## Плагин сообщества

Этот плагин разработан и поддерживается сообществом. [Внесите свой вклад в этот плагин](https://github.com/javiercasares/WPVulnerability)

## Мета

 *  Версия **4.3.1**
 *  Обновление: **3 месяца назад**
 *  Активных установок: **10 000+**
 *  Версия WordPress ** 4.7 или выше **
 *  Совместим вплоть до: **6.9.4**
 *  Версия PHP ** 5.6 или выше **
 *  Языки
 * [Catalan](https://ca.wordpress.org/plugins/wpvulnerability/), [Chinese (Taiwan)](https://tw.wordpress.org/plugins/wpvulnerability/),
   [Dutch](https://nl.wordpress.org/plugins/wpvulnerability/), [Dutch (Belgium)](https://nl-be.wordpress.org/plugins/wpvulnerability/),
   [English (US)](https://wordpress.org/plugins/wpvulnerability/), [Galician](https://gl.wordpress.org/plugins/wpvulnerability/),
   [Japanese](https://ja.wordpress.org/plugins/wpvulnerability/), [Portuguese (Brazil)](https://br.wordpress.org/plugins/wpvulnerability/),
   [Portuguese (Portugal)](https://pt.wordpress.org/plugins/wpvulnerability/), [Russian](https://ru.wordpress.org/plugins/wpvulnerability/),
   [Spanish (Chile)](https://cl.wordpress.org/plugins/wpvulnerability/), [Spanish (Colombia)](https://es-co.wordpress.org/plugins/wpvulnerability/),
   [Spanish (Ecuador)](https://es-ec.wordpress.org/plugins/wpvulnerability/), [Spanish (Spain)](https://es.wordpress.org/plugins/wpvulnerability/)
   и [Spanish (Venezuela)](https://ve.wordpress.org/plugins/wpvulnerability/).
 *  [Перевести на ваш язык](https://translate.wordpress.org/projects/wp-plugins/wpvulnerability)
 * Метки:
 * [security](https://ru.wordpress.org/plugins/tags/security/)[site health](https://ru.wordpress.org/plugins/tags/site-health/)
   [vulnerability](https://ru.wordpress.org/plugins/tags/vulnerability/)
 *  [Дополнительно](https://ru.wordpress.org/plugins/wpvulnerability/advanced/)

## Оценки

 5 из 5 звёзд.

 *  [  20 5-звездный отзыв     ](https://wordpress.org/support/plugin/wpvulnerability/reviews/?filter=5)
 *  [  0 4-звездный отзыв     ](https://wordpress.org/support/plugin/wpvulnerability/reviews/?filter=4)
 *  [  0 3-звездный отзыв     ](https://wordpress.org/support/plugin/wpvulnerability/reviews/?filter=3)
 *  [  0 2-звездный отзыв     ](https://wordpress.org/support/plugin/wpvulnerability/reviews/?filter=2)
 *  [  0 1-звездный отзыв     ](https://wordpress.org/support/plugin/wpvulnerability/reviews/?filter=1)

[Your review](https://wordpress.org/support/plugin/wpvulnerability/reviews/#new-post)

[Посмотреть всеотзывы](https://wordpress.org/support/plugin/wpvulnerability/reviews/)

## Участники

 *   [ Javier Casares ](https://profiles.wordpress.org/javiercasares/)
 *   [ David Perez ](https://profiles.wordpress.org/davidperez/)
 *   [ Lucas Bonomo ](https://profiles.wordpress.org/lbonomo/)
 *   [ Alex Lion (阿力獅) ](https://profiles.wordpress.org/alexclassroom/)

## Поддержка

Решено проблем за последние 2 месяца:

     0 из 1

 [Перейти в форум поддержки](https://wordpress.org/support/plugin/wpvulnerability/)