Plugins endpoint

To get the vulnerability information of a plugin, you have to make a call including the plugin slug.

https://www.wpvulnerability.net/plugin/here-the-plugin-slug/

Example: UpdraftPlus

Plugins JSON response

This will return a JSON with the following format:

{
  "error": 0,
  "message": null,
  "data": {
    "name": "Plugin Name",
    "plugin": "wordpress-plugin-example",
    "link": "https://wordpress.org/plugins/wordpress-plugin-example/",
    "latest": "1234567890"
    "vulnerability": [
      {
        "name": "Plugin Name [wordpress-plugin-example] <= 0.0.0",
        "description": null,
        "operator": {
          "min_version": null,
          "min_operator": null,
          "max_version": "0.0.0",
          "max_operator": "le",
          "unfixed": "0",
          "closed": "0"
        },
        "source": [
          {
            "id": "CVE-0000-00001",
            "name": "CVE-0000-00001",
            "link": "https://www.cve.org/CVERecord?id=CVE-0000-00001",
            "description": "This is an example of a vulnerability description.",
            "date": "2003-05-27"
          },
          {
            "id": "JVNDB-0000-000001",
            "name": "JVNDB-0000-000001",
            "link": "https://jvndb.jvn.jp/jvndb/JVNDB-0000-000001",
            "description": "This is an example of a vulnerability description.",
            "date": "2003-05-27"
          }
        ],
        "impact": [
          "cvss": {
            "version": "3.1",
            "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "av": "n",
            "ac": "l",
            "pr": "n",
            "ui": "n",
            "s": "u",
            "c": "h",
            "i": "h",
            "a": "h",
            "score": "9.8",
            "severity": "c",
            "exploitable": "3.9",
            "impact": "5.9"
            },
            "cwe": [
              {
                "cwe": "CWE89",
                "name": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')",
                "description": "The software constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component."
              }
            ]
        ]
      },
      {
        "name": "Plugin Name [wordpress-plugin-example] < 0.0.0",
        "description": null,
        "operator": {
          "min_version": null,
          "min_operator": null,
          "max_version": "0.0.0",
          "max_operator": "lt",
          "unfixed": "0",
          "closed": "0"
        },
        "source": [
          {
            "id": "CVE-0000-00002",
            "name": "CVE-0000-00002",
            "link": "https://www.cve.org/CVERecord?id=CVE-0000-00002",
            "description": "This is an example of a vulnerability description.",
            "date": "2004-10-06"
          }
        ],
        "impact": []
      }
    ]
  },
  "updated": 1053993600
}

Plugins JSON description

  • error: If there is an error, the value will be 1. If there is no error, it will be 0.
  • message: In case of error, an information message will be displayed.
  • data: (object) Data information group.
  • data -> name: Plugin name.
  • data -> plugin: Plugin slug.
  • data -> link: Information URL.
  • data -> latest: Last time the plugin was updated (UNIXTIME).
  • data -> vulnerability: (array) Each of the plugin’s vulnerabilities.
    • data -> vulnerability -> name: Vulnerability name.
    • data -> vulnerability -> description: Vulnerability description.
    • data -> vulnerability -> operator: (object) Vulnerability version calculation system. It is based on the PHP version_compare function.
      • data -> vulnerability -> operator -> min_version: Minimum version affected.
      • data -> vulnerability -> operator -> min_operator: Calculation operator.
      • data -> vulnerability -> operator -> max_version: Maximum version affected.
      • data -> vulnerability -> operator -> max_operator: Calculation operator.
      • data -> vulnerability -> operator -> unfixed: The vulnerability is unfixed.
      • data -> vulnerability -> operator -> closed: The plugin has closed and is no longer available for download.
    • data -> vulnerability -> source: (array) List of vulnerabilities.
      • data -> vulnerability -> source -> id: Source unique identifier.
      • data -> vulnerability -> source -> name: Source vulnerability name.
      • data -> vulnerability -> source -> link: Source vulnerability information.
      • data -> vulnerability -> source -> description: Source vulnerability description.
      • data -> vulnerability -> source -> date: Date of publication of the vulnerability.
    • data -> vulnerability -> impact: (array) Impact of the vulneravibity. (optional)
      • data -> vulnerability -> impact -> cvss: (object) CVSS score. More information in the CVSS section.
        • data -> vulnerability -> impact -> cvss -> version: CVSS Version.
        • data -> vulnerability -> impact -> cvss -> vector: CVSS Vector.
        • data -> vulnerability -> impact -> cvss -> av: Attack Vector (AV) score.
        • data -> vulnerability -> impact -> cvss -> ac: Attack Complexity (AC) score.
        • data -> vulnerability -> impact -> cvss -> pr: Privileges Required (PR) score.
        • data -> vulnerability -> impact -> cvss -> ui: User Interaction (UI) score.
        • data -> vulnerability -> impact -> cvss -> s: Scope (S) score.
        • data -> vulnerability -> impact -> cvss -> c: Confidentiality (C) score.
        • data -> vulnerability -> impact -> cvss -> i: Integrity (I) score.
        • data -> vulnerability -> impact -> cvss -> a: Availability (A) score.
        • data -> vulnerability -> impact -> cvss -> score: Global score (1.0 “-” to 9.9 “+”).
        • data -> vulnerability -> impact -> cvss -> severity: Severity.
        • data -> vulnerability -> impact -> cvss -> exploitable: Exploitability.
        • data -> vulnerability -> impact -> cvss -> impact: Global impact.
      • data -> vulnerability -> impact -> cwe: (array) CWE score. More information in the CWE section.
        • data -> vulnerability -> impact -> cwe -> cwe: CWE identificator.
        • data -> vulnerability -> impact -> cwe -> name: Name.
        • data -> vulnerability -> impact -> cwe -> description: Description.
  • update: Last information update (UNIXTIME).