Security analysis and insights from 2025

Data updated 25.02.2026

State of WordPress Security In 2026

In partnership with

Intro

There’s a concept in security called “Pre-Boom vs. Post-boom” - what you do before a breach, and what you do after.

As the threat landscape changes, there are major problems with both preventive and reactive WordPress security approaches.

Let’s start with the preventive side - WordPress vulnerabilities have always been hard to protect against using standard network and server layer security tools. But last year, we managed to put a number on it - in a large-scale pentest of popular web hosting companies, only 26% of all vulnerability attacks were blocked.

Regular plugin updates are the second line of defence, but as attackers weaponize new vulnerabilities within mere hours, this is not a viable defence.

Then there are reactive solutions - malware detection and cleanup. The WordPress ecosystem has been far too reliant on treating security as something to fix “post-boom” - but attackers are evolving, and so is their malware.

In this year’s whitepaper, we partnered up with Monarx to investigate what happens to infected websites. What they found was that attackers are getting more strategic and sophisticated in their methods - malware is getting harder to find, and even harder to remove.

About Patchstack

Patchstack is the world's #1 WordPress vulnerability intelligence provider, covering the entire lifecycle from detection to mitigation. Powered by RapidMitigate - a technology that combines software composition analysis, threat intelligence, and contextual prioritization - Patchstack delivers site-specific protection rules automatically and only to sites where a vulnerability is actually present, with near-zero false positives and no code changes.

Trusted by hosting leaders including GoDaddy, Hostinger, DigitalOcean, and Cloudways, Patchstack helps hosting companies reduce support burden, protect their users, and turn security into a revenue stream. Patchstack also manages vulnerability reporting for over 1,000 WordPress plugin vendors, including Elementor, WP Rocket, and YITH. Our mission is to make the open web more secure.

Vulnerability protection for hosts

Use Patchstack vulnerability API and protection capabilities to deliver security at scale.

Patchstack for hosts

Free pentest for hosts

Want to see how your defenses stack up against WordPress vulnerabilities? Let's find out.

Get tested for free

2025 vulnerability statistics and trends

Overall 11,334 new vulnerabilities were found in the WordPress ecosystem in 2025 - that’s a 42% increase compared to 2024.

Of all new vulnerabilities found, 4,124 (36%) represented an actual threat and were serious enough to require RapidMitigate protection rules.

1,966 (17%) vulnerabilities had a high severity score, meaning they were likely to be exploited in automated mass-scale attacks.

17%

of new vulnerabilities had high risk of mass-scale exploitation

In fact, more high-severity vulnerabilities were discovered in the WordPress ecosystem in 2025 than in the previous two years combined. This increase largely came from premium components on marketplaces like Envato, and highlights the security visibility problem of such components and marketplace. Because these components are not readily available to security researchers, it is harder to find security issues in them.

Highly exploitable vulnerabilities increased 113% YoY

Low - unlikely to be exploited. No RapidMitigate rule necessary, update recommended.

Medium - Exploitable in more targeted attacks. RapidMitigate rules deployed.

High - Actively exploited or expected to become mass-exploited. RapidMitigate rules deployed.

91% of new vulnerabilities were found in plugins, and 9% were found in themes. There were only 6 vulnerabilities reported in the WordPress core, but these were low priority issues.

91% of vulnerabilities were found in WordPress plugins

Low - unlikely to be exploited. No RapidMitigate rule necessary, update recommended.

Medium - Exploitable in more targeted attacks. RapidMitigate rules deployed.

High - Actively exploited or expected to become mass-exploited. RapidMitigate rules deployed.

For the third year in a row, Patchstack continues to be the leading vulnerability coordinator and publisher in the WordPress ecosystem, with over 1,000 plugin vendors trusting Patchstack as their security point of contact.

Top 3 WordPress vulnerability disclosers

Low - unlikely to be exploited. No RapidMitigate rule necessary, update recommended.

Medium - Exploitable in more targeted attacks. RapidMitigate rules deployed.

High - Actively exploited or expected to become mass-exploited. RapidMitigate rules deployed.

High numbers of serious vulnerabilities found in premium WordPress components

Typically, most vulnerabilities are found and reported in free plugins and themes. Premium WordPress components receive less scrutiny because it’s harder for researchers to access their code.

This is a problem because lower scrutiny does not equal better security, and lower awareness of security issues in premium products can leave these vulnerable to uncontrolled exploitation.

To understand the threat landscape of premium plugins and themes, last year we conducted focused research on premium marketplaces such as Envato.

Overall we received 1,983 valid vulnerability reports for Premium or freemium components, making up 29% of total reports.

59% of those were high Patchstack Priority vulnerabilities that can be used in automated mass attacks. A further 17% had medium Patchstack Priority, meaning they can be exploited in more targeted attacks.

That means 76% of vulnerabilities found in Premium components were exploitable in real life attacks.

Furthermore, our Zero Day program found 33 highly critical vulnerabilities in Premium components, compared to only 12 in free components.

Patchstack Zero Day program is part of our Bug Bounty program and it’s aimed at finding vulnerabilities that are either already actively exploited, or can be easily mass-exploited before public disclosure.

Reports from Patchstack Bug Bounty program by source repository

76% of vulnerabilities found in Premium components were exploitable

Low - unlikely to be exploited. No RapidMitigate rule necessary, update recommended.

Medium - Exploitable in more targeted attacks. RapidMitigate rules deployed.

High - Actively exploited or expected to become mass-exploited. RapidMitigate rules deployed.

3x

Amount of Known Exploited Vulnerabilities (KEV) in premium WordPress components compared to free components

When looking at actual attacks, premium components had three times more Known Exploited Vulnerabilities (KEV) than free components.

These findings underscore the need for more scrutiny into premium marketplaces and components. This is something we’re aiming to solve by offering free mVDP programs to plugin and theme creators.

By joining the mVDP program, plugin creators can incentivize researchers to review the security of their code while outsourcing the process to the Patchstack team.

46% of vulnerabilities were not fixed in time for public disclosure

Looking at the vulnerability disclosure timelines from last year, lack of security updates from plugin vendors continues to be a problem - 46% of vulnerabilities did not receive a fix from the developer in time for public disclosure.

This again shows why website owners can’t rely on plugin updates as a security measure.

On the research side, we saw a significant increase of AI generated “slop” vulnerability reports in 2025. Incomplete or invalid reports have always been a problem in the WordPress security space, but AI is making it easier for people to send in poorly compiled reports in hopes of getting an easy reward.

These are also problems we are aiming to solve with our free mVDP program - we have a dedicated team working on triaging and validating vulnerability reports on behalf of vendors, and advising them on delivering patches.

46% of vulnerabilities did not receive a patch by the time of disclosure

Free vulnerability disclosure program for plugins

Ensure compliance with the Cyber Resilience Act, and outsource vulnerability report validation & rewards.

Patchstack for vendors

Impact of attacks on affected websites

Patchstack’s RapidMitigate deploys protection rules at the same moment a vulnerability is disclosed. Because of this, we can see exactly when and how new vulnerabilities get exploited.

This means we have one of the best overviews into Known Exploited Vulnerabilities (KEVs) on the market.

Median time to mass exploitation for heavily exploited vulnerabilities is 5 hours

When analysing the speed at which attackers weaponize new vulnerabilities, we found that approximately half of high impact vulnerabilities get exploited within 24 hours.

When we account for how intense the exploitation was (by weighting based on observed activity), then the weighted median time to first exploit is 5 hours. This suggests that the most heavily targeted vulnerabilities are typically attacked within hours, not days.

5h

is the median time to mass exploitation for heavily exploited vulnerabilities

To understand how fast attackers move after vulnerabilities are made public (which is also when the Rapidmitigate rule is created and deployed on vulnerable sites), we measured the time between when a Rapidmitigate rule was rolled out and when we first saw an exploitation attempt for each vulnerability.

We focused on vulnerabilities that show the highest levels of exploitation in practice, reflecting what is most attractive to attackers, including flaws in widely used components and high-impact vulnerability classes. This prioritized subset accounts for ~95% of the observed exploitation activity for vulnerabilities published in 2025.

Share of vulnerabilities published in 2025 whose first exploitation was observed within the time window:

Time from vulnerability disclosure to active exploitation

Overall, this means that the first 24 hours are critical when a new exploitable vulnerability is published in the ecosystem, requiring close monitoring, fast tuning and strong response readiness.

Broken Access Control was the most exploited vulnerability

Broken Access Control is a broader category of vulnerabilities that are specific to WordPress, as they are connected to user access and authorization.

These vulnerabilities are very difficult to defend against using traditional WAFs because the exploits look like normal authenticated traffic with no obvious injection patterns.

Most exploited vulnerabilities (blocked by RapidMitigate)

Top vulnerabilities of all time exploited in 2025

When looking at top ten vulnerabilities that were being targeted most by attackers, we see that only four were published in 2025.

This is an important reminder that attackers will also attempt to exploit older vulnerabilities, hoping to infect sites that are not properly kept up to date.

Our findings support this theory. The top 10 data here is based on real exploit attempts blocked by Patchstack, meaning that the older vulnerable versions of these plugins were present on customers’ sites.

1. WordPress LiteSpeed Cache plugin (2024)

≤ 5.7

Unauthenticated Stored XSS

2. WordPress tagDiv Composer plugin (2023)

< 4.2

Unauthenticated Stored XSS

3. WordPress SureTriggers plugin (2025)

≤ 1.0.78

Authorization Bypass

4. WordPress Startklar Elementor Addons plugin(2024)

≤ 1.7.13

Unauthenticated Arbitrary File Upload

5. WordPress SureTriggers plugin (2025)

≤ 1.0.82

Privilege Escalation

6. WordPress GiveWP plugin (2024)

≤ 3.14.1

PHP Object Injection to RCE

7. WordPress FunnelKit Automations plugin (2025)

≤ 3.5.3

Unauthenticated Plugin Installation

8. WordPress LiteSpeed Cache plugin (2024)

≤ 6.3.0.1

Unauthenticated Privilege Escalation

9. WordPress WooCommerce Payments plugin (2023)

≤ 5.6.1

Unauthenticated Privilege Escalation

10. WordPress Ads Pro plugin (2025)

≤ 4.89

Local File Inclusion

Hosting companies largely powerless against WordPress vulnerability attacks

The growing number of WordPress vulnerabilities and faster exploitation times are putting a lot of pressure on the hosting industry’s defences - but research shows that most of the defences are not effective.

In 2025 we conducted two separate pentesting studies where we tested the effectiveness of common security solutions (internal WAFs, Cloudflare etc.) against vulnerability exploits.

The first one, focusing on known exploited vulnerabilities, revealed that traditional defences only blocked 12% of WordPress-specific vulnerability attacks. In the second experiment, we expanded the scope to test more vulnerabilities, including more generic ones - but still, only 26% of total attacks were blocked.

What’s interesting is that similar defensive solution combinations performed very differently across hosting environments:

Vulnerability block rates by host

These differences were likely due to how different companies had set up their internal WAF solutions. Overall, internal WAF’s also performed somewhat better against generic, non-WordPress specific vulnerabilities, while security vendor suites were less effective.

Top malware trends from 2025

Powered by

Monarx operates server-level malware detection across global hosting infrastructure. During 2025, their platform processed nearly 9 trillion file signals, providing visibility into how WordPress vulnerabilities are exploited in real-world attacks.

Behind every trillion signals processed by Monarx lies a sophisticated narrative of how modern attackers operate.

By analyzing over 2 billion malware infections and 3 billion blocked runtime operations, Monarx data reveals what happens after vulnerable sites are compromised, complementing Patchstack's vulnerability intelligence with post-exploitation insights.

Injected files make malware removal difficult

The 2025 data demonstrates that signature-based "delete-only" security is no longer sufficient, as attackers increasingly favor compromising legitimate files during peak traffic periods.

Unlike malicious files which can simply be deleted automatically, injected files are legitimate WordPress core, plugin or theme components that contain malicious snippets.

This is also why Monarx is focusing on automated surgical malware remediation, rather than just deleting obvious malicious files.

The Holiday Attack Surge: A Critical Risk Window

Throughout 2025, Monarx observed a distinct seasonal pattern in attack activity - malicious file uploads showed a dramatic spike during Q4 holidays - nearly tripling in volume during November and December.

This "Holiday Spike" is driven by a dangerous convergence - high consumer traffic meets reduced IT staffing. Attackers capitalize on diminished administrative response times, while IT teams are at minimum capacity.

Malicious file uploads spike during the Q4 holiday season.

Attackers are pivoting to complex multi-stage attacks

Monarx's 2025 data revealed a significant strategic shift in attacker behavior. While Adware remained the most prevalent malware category throughout the year, Uploader scripts nearly doubled in volume in June 2025 and maintained that elevated presence through year-end.

This sustained increase suggests attackers are moving beyond opportunistic, one-off compromises. Instead, they're investing in persistent infrastructure—planting uploaders that enable multi-stage attacks and long-term access to compromised sites.

Persistent infrastructure means attackers aren't just exploiting vulnerabilities once and moving on. They're establishing footholds that allow them to return, deploy additional payloads, and maintain access even after initial infections are cleaned.

This makes post-breach remediation significantly more complex and increases the likelihood of reinfection.

Sustained increase of uploader scripts suggest a strategic pivot by attackers.

Modern malware is designed to be stealthy

Analysis of the most prevalent malware campaigns in 2025 reveals why traditional security scanning often fails to detect compromised sites.

There are two major evasion techniques attackers use to avoid detection, and to reinfect websites after cleanup:

Selective payload delivery

The dominant attack families (Japanese SEO, jgalls, Parrot TDS) all use "cloaking" techniques to serve different content based on who visits the website. Search engine bots see keyword-stuffed spam to boost rankings, while human visitors get redirected to phishing sites or fraudulent stores. Security scanners and site owners often see clean content, making infections invisible until customer complaints arrive or search rankings tank.

Modern variants have evolved further - Parrot TDS now detects AI training crawlers (like ChatGPT and Google Gemini) to serve them clean content while continuing to exploit human visitors, making automated detection even more challenging.

Top malicious code sequences injected into legitimate files in 2025. Parrot TDS is a sophisticated "gatekeeper" system that inspects each visitor and selectively routes them to malicious payloads based on their profile.

Memory-resident persistence

The Lock360 malware family demonstrates why simple file cleanup fails. This campaign runs malicious code in server memory, automatically monitoring and reinfecting files like index.php and .htaccess the moment they're restored.

Support teams find themselves in a frustrating cycle - they clean an infection only for it to immediately rewrite itself because the malware is still running in the background.

Top injected file SHA256 hashes in 2025. The Lock360 malware family—which uses memory-resident techniques to automatically reinfect cleaned files—accounted for the top two most prevalent variants by significant margin.

These evasion techniques explain why hosting providers often don't discover compromises until significant damage has occurred - degraded SEO rankings, customer complaints about redirects, or blacklisting by security services. By the time the infection is visible, the attacker has already achieved their objective.

For the full technical analysis of the top 2025 malware trends, head over to our partners at Monarx.

Read full analysis

What to expect from 2026

Securing WordPress websites and plugins is getting harder and more important than ever before. In 2026, we find ourselves at the crossroads of a deep technological shift and growing pressure to adopt new security measures to comply with new EU regulations such as the Cyber Resilience Act.

WordPress is no longer the easiest and most extensible way to build websites. Vibe coding is here to stay, and it's rapidly merging with WordPress, where agencies generate new plugins on demand and let AI generate website front-ends with React, while WordPress provides the "plumbing" and a stable backend CMS.

To secure WordPress websites in 2026 and beyond, we can't look at just WordPress anymore. The application-level attack surface of a WordPress website is going to be much larger than the WordPress core, plugins, and themes. To truly secure WordPress websites, we need to look deeper than ever before. We need to cover custom-coded plugins, have deep visibility into the JavaScript and PHP packages being used, and more.

While the attack surface is expanding, attackers are being equipped with AI that is increasingly capable of autonomously finding and exploiting security vulnerabilities. The same tools are also available to the defending side; however, not everything needs defending. "AI slop" security reports are causing overhead and noise for security teams at unprecedented levels. In 2026, every commercial WordPress plugin will need to have a vulnerability disclosure program (VDP) set up by law in order to make their software available to European users. Will they all have the resources to deal with the insane amount of incoming security reports? Probably not.

In 2026, everybody needs deep visibility into what their websites are made of and put automated security measures in place to mitigate new security vulnerabilities in less than five hours. Vulnerability Disclosure Programs (VDPs) need to become a standard not just for plugins, but also for websites, to make sure every vulnerability report is captured and goes through a process.

Alex Sandham - account executive

Want to learn more about how web hosts use Patchstack to prevent vulnerability attacks?

Let's talk

“Patchstack is like CrowdStrike, but for websites!”

Ryan McCue

Director of Product at Human Made

“We highly recommend Patchstack to other companies looking to enhance their security posture. For us, Patchstack is a true partner in our security efforts...”

Miriam Schwab

Head of WP relations at Elementor

“I consider Patchstack the most exciting company in the WordPress (and soon wider open-source) security space.”

Joost De Valk

Founder of YoastSEO

“Over the last 6 months, Patchstack has protected our users from 1.3 million vulnerabilities.”

Wes Tatters

Managing Director

Brought to you by

Darius Sveikauskas Head of Threat Intelligence at Patchstack
Edouard L. Security Engineer at Patchstack
Oliver Sild CEO at Patchstack
Mart Virkus Head of Marketing at Patchstack
Salvador Aguilar Threat Research Manager at Monarx
Joe Bruno Principal Security Engineer at Monarx
cross