Transparent plans built for scale — whether you're a hobbyist or a security platform.
For developers and personal use
Perfect for startups and security teams
Custom solutions for scale
required
— must be one of:
plugin
,
theme
, or
core
.
required
for plugin/theme
— the slug of the plugin or theme.
Not required when type=core
.
optional
— when included, returns vulnerabilities for that exact version.
Works with all types:
plugin
,
theme
, or
core
.
GET /api/vulnerabilities?type=plugin&slug=contact-form-7&version=6.0.3 Headers: Authorization: Bearer YOUR_API_KEY_HERE
When the version
parameter is omitted, the API returns all known vulnerabilities for the
specified plugin/theme/core across multiple versions.
{ "count": 1, "data": [ { "id": 5834, "title": "Contact Form 7 <= 6.0.5 - Order Replay Vulnerability", "type": "plugin", "name": "Contact Form 7", "slug": "contact-form-7", "affected_versions": { "* - 6.0.5": { "to_version": "6.0.5", "from_version": "*", "to_inclusive": true, "from_inclusive": true } }, "patched": 1, "patched_versions": ["6.0.6"], "remediation": "Update to version 6.0.6, or a newer patched version.", "description": "The Contact Form 7 plugin for WordPress is vulnerable to Order Replay...", "references": [ "https://www.wordfence.com/threat-intel/vulnerabilities/id/38257dbf..." ], "cvss_score": "5.3", "cvss_rating": "Medium", "cve": "CVE-2025-3247", "published": "2025-04-15T16:56:22Z", "updated": "2025-04-16T05:23:03Z" } ] }