Free, honest security
intelligence.
WP-Safety aggregates CVE data, vulnerability disclosures, and plugin metadata into one place — no account required, no upsells, no vendor spin.
What we track
Every plugin in the WordPress.org directory, with install counts, update history, and author data.
Public WordPress themes with the same vulnerability and metadata coverage as plugins.
Vulnerability records sourced from Wordfence Intelligence and NVD, updated daily.
Data sources
Multiple independent feeds, cross-referenced and refreshed daily.
Plugin and theme metadata including install counts, versions, author profiles, and update frequency. Fetched directly from the official REST APIs.
Comprehensive WordPress-specific vulnerability data. One of the most complete databases of WordPress CVEs, including CVSS scores and affected version ranges.
NIST's NVD provides standardized CVSS scoring and CVE identifiers that we cross-reference against plugin and theme slugs.
Security scoring methodology
Our scores (0–100, higher is safer) are composite metrics that go beyond raw CVSS. Each vulnerability is weighted by real-world factors:
Unpatched vulnerabilities are weighted more heavily than patched ones. A plugin with one unpatched critical CVE will score worse than one with five patched medium CVEs.
Our principles
Non-negotiable. These define everything we build.
No paywalls, no accounts, no feature gating. Security data should be accessible to everyone.
We don't accept sponsorships from plugin vendors or security companies that could bias our data.
Our scoring formula and data sources are fully documented and open to scrutiny.
Data is updated every 24 hours. Newly disclosed vulnerabilities appear as soon as they're in the upstream feeds.
WP-Safety is not affiliated with WordPress Foundation, Automattic, or Wordfence. Security data is provided for informational purposes only. Always verify vulnerabilities against official advisories before making production decisions. Data is refreshed daily but may lag behind newly disclosed CVEs.