Your customers deserve a secure WordPress hosting

Offer your users a secure WordPress hosting experience with real-time vulnerability monitoring and instant rapid protection. Leave us your contacts to get a FREE security overview of how many vulnerabilities your users have.
Leave contacts and request report

“Patchstack has led to the prevention of more than 56 000 vulnerabilities in our Managed WordPress installations.”

Liza Bogatyrev

Product Marketing Manager at One.com

We secure the WordPress hosting experience for

Auto-detect security vulnerabilities across all hosted WordPress websites

48h early vulnerability detection
Monitor active exploitation

Prioritize updates with patch priority

Save time with prevalidated multi-sourced intel

Virtual patching provides non-intrusive rapid mitigation for vulnerabilities at scale

Highly targeted and lightweight
Auto-connect and -deploy via API
No code changes or false positives
Reduce malware infections

Offer targeted protection when vulnerabilities are detected for a significant revenue opportunity

Dashboard integration
Low friction for customers
High conversion rate

Included in Enterprise API

See API documentation
Unlimited API calls
Multiple endpoints
48h early warning
Local cache results
Partners’ Slack
IP reputation on request

API datapoints:

Software name
Software type (plugin, theme, core)
Software type (free, premium)
Version info (fixed-in, ranges)
Detailed vulnerability description
Link to database entry
Patchstack patch priority
CVSS score
CVE identification number
OWASP type classification
Vulnerability disclosure date
References to external resources
References to original researchers
Exploitation indicator

Enterprise API JSON example


"vulnerabilities":[
  {
    "id":7976,
    "product_id":2175,
    "title":"WordPress File Upload plugin <= 4.16.2 - Contributor+ Path Traversal vulnerability leading to Remote Code Execution (RCE)",
    "description":"Contributor+ Path Traversal vulnerability leading to Remote Code Execution (RCE) discovered by apple502j in WordPress File Upload plugin (versions <= 4.16.2).",
    "vuln_type":"Directory Traversal",
    "cvss_score":8.8,
    "patch_priority": 3,
    "is_exploited":true,
    "cve":["2021-24962"],

    "product_slug":"wp-file-upload",
    "product_name":"WordPress File Upload",
    "product_name_premium":null,
    "product_type":"Plugin",
    "affected_in":"<= 4.16.2",
    "fixed_in":"4.16.3",
    "patched_in_ranges":[],

    "disclosure_date":"2022-03-01 00:00:00",
    "disclosed_at":"2022-03-01T00:00:00+00:00",
    "created_at":"2022-03-07T11:17:05+00:00", 

    "url":"wordpress-file-upload-plugin-4-16-2-contributor-path-traversal-vulnerability-leading-to-remote-code-execution-rce",
    "direct_url":"https://patchstack.com/database/vulnerability/wp-file-upload/wordpress-file-upload-plugin-4-16-2-contributor-path-traversal-vulnerability-leading-to-remote-code-execution-rce"
  },

Take your WordPress hosting to the next level with vulnerability management

Request a free security report with information about how many and what severity vulnerabilities your userbase has.
Leave contacts and request report
We are trusted by MITRE to assign CVE IDs to new security vulnerabilities and our technology is backed by the EU Innovation Council. In 2023 Patchstack published over 5,900+ vulnerabilities affecting millions of WordPress sites.
We secure the WordPress hosting experience for
pagely
logo/affiliate/hostinger
Logo-group.ONE_-1
veebimajutus
Looks like your browser is blocking our support chat widget. Turn off adblockers and reload the page.
crossmenu