VulnTitan

VulnTitan

The WordPress Vulnerability Index

📦 VulnTitan API Pricing

Transparent plans built for scale — whether you're a hobbyist or a security platform.

Free

For developers and personal use

  • 25 requests/day
  • Plugin, Theme & Core lookup
  • Bulk scanning
$0/mo
Start for Free

Pro

Perfect for startups and security teams

  • 10,000 requests/month
  • Bulk plugin/theme/core scanning
  • Priority data updates
  • Email support
$29/mo
Purchase Pro

Enterprise

Custom solutions for scale

  • Unlimited requests
  • Dedicated endpoints
  • Custom SLAs
  • Account manager
Contact Sales

⚙️ Request Parameters

  • type required — must be one of: plugin, theme, or core.
  • slug required for plugin/theme — the slug of the plugin or theme. Not required when type=core.
  • version optional — when included, returns vulnerabilities for that exact version. Works with all types: plugin, theme, or core.

📄 Example: Plugin Vulnerability Lookup (with version)

🔍 Example GET Request

GET /api/vulnerabilities?type=plugin&slug=contact-form-7&version=6.0.3

Headers:
Authorization: Bearer YOUR_API_KEY_HERE
        

When the version parameter is omitted, the API returns all known vulnerabilities for the specified plugin/theme/core across multiple versions.

📦 Example JSON Response

{
    "count": 1,
    "data": [
        {
        "id": 5834,
        "title": "Contact Form 7 <= 6.0.5 - Order Replay Vulnerability",
        "type": "plugin",
        "name": "Contact Form 7",
        "slug": "contact-form-7",
        "affected_versions": {
            "* - 6.0.5": {
            "to_version": "6.0.5",
            "from_version": "*",
            "to_inclusive": true,
            "from_inclusive": true
            }
        },
        "patched": 1,
        "patched_versions": ["6.0.6"],
        "remediation": "Update to version 6.0.6, or a newer patched version.",
        "description": "The Contact Form 7 plugin for WordPress is vulnerable to Order Replay...",
        "references": [
            "https://www.wordfence.com/threat-intel/vulnerabilities/id/38257dbf..."
        ],
        "cvss_score": "5.3",
        "cvss_rating": "Medium",
        "cve": "CVE-2025-3247",
        "published": "2025-04-15T16:56:22Z",
        "updated": "2025-04-16T05:23:03Z"
        }
    ]
}
            

📌 Terms & Limits

  • Rate limits apply based on your subscription tier.
  • API keys are intended for use with a single project only.
  • Misuse or abuse may result in API key suspension.
  • Terms may change with prior notice.