Skip to content
Security

Wordfence Intelligence: 116 WordPress Vulnerabilities Disclosed Last Week

116 WordPress vulnerabilities were disclosed last week, including 6 critical ones. Wordfence highlights risks and urges operators to act now.

Wordfence Intelligence: 116 WordPress Vulnerabilities Disclosed Last Week
Photo: Miguel Á. Padriñán on Pexels

Some links on this page are affiliate links. We may earn a commission when you click through and make a purchase, at no additional cost to you.

WordPress site operators face a critical need to act, as 116 vulnerabilities were disclosed across 78 plugins and 19 themes between March 9 and March 15, 2026, according to the latest report from Wordfence.com" rel="nofollow noopener" target="_blank">Wordfence. These vulnerabilities highlight the ongoing challenges in safeguarding WordPress websites and the vital role of proactive security measures.

The Wordfence Intelligence Vulnerability Database now includes these disclosures, making it one of the most comprehensive resources available for WordPress practitioners. Of the 116 vulnerabilities added, 86 have been patched, while 30 remain unpatched, exposing site operators to potential exploitation risks. The vulnerabilities span various classes, including Cross-site Scripting (XSS), SQL Injection, and Authorization Bypass, with six rated as critical severity.

Total Vulnerabilities by Severity

Breaking down the numbers, last week’s disclosures included:

wordpress vulnerability report
Chart illustrating the distribution of vulnerabilities by severity last week. — Photo: Tima Miroshnichenko / Pexels
  • 6 critical severity vulnerabilities
  • 39 high severity vulnerabilities
  • 71 medium severity vulnerabilities

Among the most common vulnerability types were improper neutralization of input during web page generation (32 cases of XSS) and missing authorization (27 cases). Site operators using affected plugins or themes should review the full report to identify exposure risks.

Firewall Rules and Proactive Protection

Wordfence’s Threat Intelligence Team continues to deploy new firewall rules to mitigate immediate risks. Last week, two firewall rules—WAF-RULE-904 and WAF-RULE-905—were rolled out to Wordfence Premium, Care, and Response customers. Details on these rules remain redacted as Wordfence works with vendors to finalize patches. Free users will receive this protection after a 30-day delay.

The Wordfence CLI Vulnerability Scanner and API tools are freely available and enable enterprises, hosting providers, and individuals to run regular scans or integrate real-time updates into their workflows. With over 33,000 vulnerabilities cataloged, Wordfence offers unmatched access to actionable security intelligence.

Triple Threat Bug Bounty Challenge

Wordfence is incentivizing security researchers through its Triple Threat Bug Bounty Challenge, running until April 6, 2026. Researchers can earn triple bonuses on valid submissions from the ‘High Threat Vulnerabilities’ list:

wordpress vulnerability report
Security researchers collaborating to address high threat vulnerabilities in WordPress. — Photo: Brett Sayles / Pexels
  • Double payouts for high threat vulnerabilities (excluding plugins with 5,000,000+ installs)
  • 30% bonus for vulnerabilities in software with 30,000+ active installs
  • $300 extra for every three high threat vulnerabilities submitted (minimum of 1,000 installs each)

Last week, 66 researchers contributed to WordPress security, with Tran Nguyen Bao Khanh leading the effort by disclosing 13 vulnerabilities. Active participation in the bounty program not only enhances WordPress security but also provides significant financial incentives.

What To Do

  • Developers: Audit your plugins and themes against the latest vulnerabilities disclosed in the Wordfence Intelligence Weekly Report. Update codebases to address any flagged issues.
  • Site Operators: Use the Wordfence CLI Vulnerability Scanner or Database API to check your installations for exposure to unpatched vulnerabilities.
  • Managed Hosting Providers: Deploy the latest firewall rules immediately for customers using Wordfence Premium, Care, or Response plans. Monitor for unpatched risks.
  • Security Researchers: Participate in the Triple Threat Bug Bounty Challenge for enhanced rewards and help mitigate high-risk vulnerabilities.

Related News