Transparent plans built for scale — whether you're a hobbyist or a security platform.
For developers and personal use
Perfect for startups and security teams
Custom solutions for scale
required
— must be one of:
plugin,
theme, or
core.
required
for plugin/theme
— the slug of the plugin or theme.
Not required when type=core.
optional
— when included, returns vulnerabilities for that exact version.
Works with all types:
plugin,
theme, or
core.
GET /api/vulnerabilities?type=plugin&slug=contact-form-7&version=6.0.3
Headers:
Authorization: Bearer YOUR_API_KEY_HERE
When the version
parameter is omitted, the API returns all known vulnerabilities for the
specified plugin/theme/core across multiple versions.
{
"count": 1,
"data": [
{
"id": 5834,
"title": "Contact Form 7 <= 6.0.5 - Order Replay Vulnerability",
"type": "plugin",
"name": "Contact Form 7",
"slug": "contact-form-7",
"affected_versions": {
"* - 6.0.5": {
"to_version": "6.0.5",
"from_version": "*",
"to_inclusive": true,
"from_inclusive": true
}
},
"patched": 1,
"patched_versions": ["6.0.6"],
"remediation": "Update to version 6.0.6, or a newer patched version.",
"description": "The Contact Form 7 plugin for WordPress is vulnerable to Order Replay...",
"references": [
"https://www.wordfence.com/threat-intel/vulnerabilities/id/38257dbf..."
],
"cvss_score": "5.3",
"cvss_rating": "Medium",
"cve": "CVE-2025-3247",
"published": "2025-04-15T16:56:22Z",
"updated": "2025-04-16T05:23:03Z"
}
]
}