In partnership with
There’s a concept in security called “Pre-Boom vs. Post-boom” - what you do before a breach, and what you do after.
As the threat landscape changes, there are major problems with both preventive and reactive WordPress security approaches.
Let’s start with the preventive side - WordPress vulnerabilities have always been hard to protect against using standard network and server layer security tools. But last year, we managed to put a number on it - in a large-scale pentest of popular web hosting companies, only 26% of all vulnerability attacks were blocked.
Regular plugin updates are the second line of defence, but as attackers weaponize new vulnerabilities within mere hours, this is not a viable defence.
Then there are reactive solutions - malware detection and cleanup. The WordPress ecosystem has been far too reliant on treating security as something to fix “post-boom” - but attackers are evolving, and so is their malware.
In this year’s whitepaper, we partnered up with Monarx to investigate what happens to infected websites. What they found was that attackers are getting more strategic and sophisticated in their methods - malware is getting harder to find, and even harder to remove.
Patchstack is the world's #1 WordPress vulnerability intelligence provider, covering the entire lifecycle from detection to mitigation. Powered by RapidMitigate - a technology that combines software composition analysis, threat intelligence, and contextual prioritization - Patchstack delivers site-specific protection rules automatically and only to sites where a vulnerability is actually present, with near-zero false positives and no code changes.
Trusted by hosting leaders including GoDaddy, Hostinger, DigitalOcean, and Cloudways, Patchstack helps hosting companies reduce support burden, protect their users, and turn security into a revenue stream. Patchstack also manages vulnerability reporting for over 1,000 WordPress plugin vendors, including Elementor, WP Rocket, and YITH. Our mission is to make the open web more secure.
Use Patchstack vulnerability API and protection capabilities to deliver security at scale.
Patchstack for hosts
Want to see how your defenses stack up against WordPress vulnerabilities? Let's find out.
Get tested for freeOverall 11,334 new vulnerabilities were found in the WordPress ecosystem in 2025 - that’s a 42% increase compared to 2024.
Of all new vulnerabilities found, 4,124 (36%) represented an actual threat and were serious enough to require RapidMitigate protection rules.
1,966 (17%) vulnerabilities had a high severity score, meaning they were likely to be exploited in automated mass-scale attacks.
17%
of new vulnerabilities had high risk of mass-scale exploitation
In fact, more high-severity vulnerabilities were discovered in the WordPress ecosystem in 2025 than in the previous two years combined. This increase largely came from premium components on marketplaces like Envato, and highlights the security visibility problem of such components and marketplace. Because these components are not readily available to security researchers, it is harder to find security issues in them.
Low - unlikely to be exploited. No RapidMitigate rule necessary, update recommended.
Medium - Exploitable in more targeted attacks. RapidMitigate rules deployed.
High - Actively exploited or expected to become mass-exploited. RapidMitigate rules deployed.
91% of new vulnerabilities were found in plugins, and 9% were found in themes. There were only 6 vulnerabilities reported in the WordPress core, but these were low priority issues.
Low - unlikely to be exploited. No RapidMitigate rule necessary, update recommended.
Medium - Exploitable in more targeted attacks. RapidMitigate rules deployed.
High - Actively exploited or expected to become mass-exploited. RapidMitigate rules deployed.
For the third year in a row, Patchstack continues to be the leading vulnerability coordinator and publisher in the WordPress ecosystem, with over 1,000 plugin vendors trusting Patchstack as their security point of contact.
Low - unlikely to be exploited. No RapidMitigate rule necessary, update recommended.
Medium - Exploitable in more targeted attacks. RapidMitigate rules deployed.
High - Actively exploited or expected to become mass-exploited. RapidMitigate rules deployed.
Typically, most vulnerabilities are found and reported in free plugins and themes. Premium WordPress components receive less scrutiny because it’s harder for researchers to access their code.
This is a problem because lower scrutiny does not equal better security, and lower awareness of security issues in premium products can leave these vulnerable to uncontrolled exploitation.
To understand the threat landscape of premium plugins and themes, last year we conducted focused research on premium marketplaces such as Envato.
Overall we received 1,983 valid vulnerability reports for Premium or freemium components, making up 29% of total reports.
59% of those were high Patchstack Priority vulnerabilities that can be used in automated mass attacks. A further 17% had medium Patchstack Priority, meaning they can be exploited in more targeted attacks.
That means 76% of vulnerabilities found in Premium components were exploitable in real life attacks.
Furthermore, our Zero Day program found 33 highly critical vulnerabilities in Premium components, compared to only 12 in free components.
Patchstack Zero Day program is part of our Bug Bounty program and it’s aimed at finding vulnerabilities that are either already actively exploited, or can be easily mass-exploited before public disclosure.
Low - unlikely to be exploited. No RapidMitigate rule necessary, update recommended.
Medium - Exploitable in more targeted attacks. RapidMitigate rules deployed.
High - Actively exploited or expected to become mass-exploited. RapidMitigate rules deployed.
3x
Amount of Known Exploited Vulnerabilities (KEV) in premium WordPress components compared to free components
When looking at actual attacks, premium components had three times more Known Exploited Vulnerabilities (KEV) than free components.
These findings underscore the need for more scrutiny into premium marketplaces and components. This is something we’re aiming to solve by offering free mVDP programs to plugin and theme creators.
By joining the mVDP program, plugin creators can incentivize researchers to review the security of their code while outsourcing the process to the Patchstack team.
Looking at the vulnerability disclosure timelines from last year, lack of security updates from plugin vendors continues to be a problem - 46% of vulnerabilities did not receive a fix from the developer in time for public disclosure.
This again shows why website owners can’t rely on plugin updates as a security measure.
On the research side, we saw a significant increase of AI generated “slop” vulnerability reports in 2025. Incomplete or invalid reports have always been a problem in the WordPress security space, but AI is making it easier for people to send in poorly compiled reports in hopes of getting an easy reward.
These are also problems we are aiming to solve with our free mVDP program - we have a dedicated team working on triaging and validating vulnerability reports on behalf of vendors, and advising them on delivering patches.
Ensure compliance with the Cyber Resilience Act, and outsource vulnerability report validation & rewards.
Patchstack for vendorsPatchstack’s RapidMitigate deploys protection rules at the same moment a vulnerability is disclosed. Because of this, we can see exactly when and how new vulnerabilities get exploited.
This means we have one of the best overviews into Known Exploited Vulnerabilities (KEVs) on the market.
When analysing the speed at which attackers weaponize new vulnerabilities, we found that approximately half of high impact vulnerabilities get exploited within 24 hours.
When we account for how intense the exploitation was (by weighting based on observed activity), then the weighted median time to first exploit is 5 hours. This suggests that the most heavily targeted vulnerabilities are typically attacked within hours, not days.
5h
is the median time to mass exploitation for heavily exploited vulnerabilities
To understand how fast attackers move after vulnerabilities are made public (which is also when the Rapidmitigate rule is created and deployed on vulnerable sites), we measured the time between when a Rapidmitigate rule was rolled out and when we first saw an exploitation attempt for each vulnerability.
We focused on vulnerabilities that show the highest levels of exploitation in practice, reflecting what is most attractive to attackers, including flaws in widely used components and high-impact vulnerability classes. This prioritized subset accounts for ~95% of the observed exploitation activity for vulnerabilities published in 2025.
Share of vulnerabilities published in 2025 whose first exploitation was observed within the time window:
Overall, this means that the first 24 hours are critical when a new exploitable vulnerability is published in the ecosystem, requiring close monitoring, fast tuning and strong response readiness.
Broken Access Control is a broader category of vulnerabilities that are specific to WordPress, as they are connected to user access and authorization.
These vulnerabilities are very difficult to defend against using traditional WAFs because the exploits look like normal authenticated traffic with no obvious injection patterns.
When looking at top ten vulnerabilities that were being targeted most by attackers, we see that only four were published in 2025.
This is an important reminder that attackers will also attempt to exploit older vulnerabilities, hoping to infect sites that are not properly kept up to date.
Our findings support this theory. The top 10 data here is based on real exploit attempts blocked by Patchstack, meaning that the older vulnerable versions of these plugins were present on customers’ sites.
The growing number of WordPress vulnerabilities and faster exploitation times are putting a lot of pressure on the hosting industry’s defences - but research shows that most of the defences are not effective.
In 2025 we conducted two separate pentesting studies where we tested the effectiveness of common security solutions (internal WAFs, Cloudflare etc.) against vulnerability exploits.
The first one, focusing on known exploited vulnerabilities, revealed that traditional defences only blocked 12% of WordPress-specific vulnerability attacks. In the second experiment, we expanded the scope to test more vulnerabilities, including more generic ones - but still, only 26% of total attacks were blocked.
What’s interesting is that similar defensive solution combinations performed very differently across hosting environments:
These differences were likely due to how different companies had set up their internal WAF solutions. Overall, internal WAF’s also performed somewhat better against generic, non-WordPress specific vulnerabilities, while security vendor suites were less effective.
Powered by
Monarx operates server-level malware detection across global hosting infrastructure. During 2025, their platform processed nearly 9 trillion file signals, providing visibility into how WordPress vulnerabilities are exploited in real-world attacks.
Behind every trillion signals processed by Monarx lies a sophisticated narrative of how modern attackers operate.
By analyzing over 2 billion malware infections and 3 billion blocked runtime operations, Monarx data reveals what happens after vulnerable sites are compromised, complementing Patchstack's vulnerability intelligence with post-exploitation insights.
The 2025 data demonstrates that signature-based "delete-only" security is no longer sufficient, as attackers increasingly favor compromising legitimate files during peak traffic periods.
Unlike malicious files which can simply be deleted automatically, injected files are legitimate WordPress core, plugin or theme components that contain malicious snippets.
This is also why Monarx is focusing on automated surgical malware remediation, rather than just deleting obvious malicious files.
Throughout 2025, Monarx observed a distinct seasonal pattern in attack activity - malicious file uploads showed a dramatic spike during Q4 holidays - nearly tripling in volume during November and December.
This "Holiday Spike" is driven by a dangerous convergence - high consumer traffic meets reduced IT staffing. Attackers capitalize on diminished administrative response times, while IT teams are at minimum capacity.

Monarx's 2025 data revealed a significant strategic shift in attacker behavior. While Adware remained the most prevalent malware category throughout the year, Uploader scripts nearly doubled in volume in June 2025 and maintained that elevated presence through year-end.
This sustained increase suggests attackers are moving beyond opportunistic, one-off compromises. Instead, they're investing in persistent infrastructure—planting uploaders that enable multi-stage attacks and long-term access to compromised sites.
Persistent infrastructure means attackers aren't just exploiting vulnerabilities once and moving on. They're establishing footholds that allow them to return, deploy additional payloads, and maintain access even after initial infections are cleaned.
This makes post-breach remediation significantly more complex and increases the likelihood of reinfection.

Analysis of the most prevalent malware campaigns in 2025 reveals why traditional security scanning often fails to detect compromised sites.
There are two major evasion techniques attackers use to avoid detection, and to reinfect websites after cleanup:
The dominant attack families (Japanese SEO, jgalls, Parrot TDS) all use "cloaking" techniques to serve different content based on who visits the website. Search engine bots see keyword-stuffed spam to boost rankings, while human visitors get redirected to phishing sites or fraudulent stores. Security scanners and site owners often see clean content, making infections invisible until customer complaints arrive or search rankings tank.
Modern variants have evolved further - Parrot TDS now detects AI training crawlers (like ChatGPT and Google Gemini) to serve them clean content while continuing to exploit human visitors, making automated detection even more challenging.

The Lock360 malware family demonstrates why simple file cleanup fails. This campaign runs malicious code in server memory, automatically monitoring and reinfecting files like index.php and .htaccess the moment they're restored.
Support teams find themselves in a frustrating cycle - they clean an infection only for it to immediately rewrite itself because the malware is still running in the background.

These evasion techniques explain why hosting providers often don't discover compromises until significant damage has occurred - degraded SEO rankings, customer complaints about redirects, or blacklisting by security services. By the time the infection is visible, the attacker has already achieved their objective.
For the full technical analysis of the top 2025 malware trends, head over to our partners at Monarx.
Read full analysisSecuring WordPress websites and plugins is getting harder and more important than ever before. In 2026, we find ourselves at the crossroads of a deep technological shift and growing pressure to adopt new security measures to comply with new EU regulations such as the Cyber Resilience Act.
WordPress is no longer the easiest and most extensible way to build websites. Vibe coding is here to stay, and it's rapidly merging with WordPress, where agencies generate new plugins on demand and let AI generate website front-ends with React, while WordPress provides the "plumbing" and a stable backend CMS.
To secure WordPress websites in 2026 and beyond, we can't look at just WordPress anymore. The application-level attack surface of a WordPress website is going to be much larger than the WordPress core, plugins, and themes. To truly secure WordPress websites, we need to look deeper than ever before. We need to cover custom-coded plugins, have deep visibility into the JavaScript and PHP packages being used, and more.
While the attack surface is expanding, attackers are being equipped with AI that is increasingly capable of autonomously finding and exploiting security vulnerabilities. The same tools are also available to the defending side; however, not everything needs defending. "AI slop" security reports are causing overhead and noise for security teams at unprecedented levels. In 2026, every commercial WordPress plugin will need to have a vulnerability disclosure program (VDP) set up by law in order to make their software available to European users. Will they all have the resources to deal with the insane amount of incoming security reports? Probably not.
In 2026, everybody needs deep visibility into what their websites are made of and put automated security measures in place to mitigate new security vulnerabilities in less than five hours. Vulnerability Disclosure Programs (VDPs) need to become a standard not just for plugins, but also for websites, to make sure every vulnerability report is captured and goes through a process.
Alex Sandham - account executive
Want to learn more about how web hosts use Patchstack to prevent vulnerability attacks?
Let's talk