Detect plugin CVEs, exposed xmlrpc.php, user enumeration, version disclosure and 18 more WordPress-specific vulnerabilities in 30 seconds.
Free for up to 3 scans per month. No credit card required.
Six WordPress-specific vulnerability classes, mapped 1:1 to the passive checks DygDog runs against your site.
Detected version is checked against the WPScan vulnerability database. Every published CVE for that release is surfaced with CVSS score, fixed_in version, and remediation guidance.
Plugins and themes are enumerated passively from /wp-content/ asset URLs, their versions extracted from readme.txt / style.css, and each cross-checked against WPScan for known CVEs.
Probes /xmlrpc.php — a notorious credential-stuffing amplifier (system.multicall bundles up to 1,000 auth attempts per HTTP request) and pingback DDoS vector.
Tests the /wp-json/wp/v2/users REST endpoint and the /?author=1 redirect trick that leaks valid login usernames to anonymous attackers.
Detects the WordPress version via meta generator tags, /readme.html, and asset ?ver= query strings — all of which fingerprint the install for targeted CVE attacks.
Probes a 28-path panel of credential and config files — .env variants, wp-config.php backups, debug.log, .git metadata, and more — that misconfigured servers commonly leak.
43% of all websites run WordPress.
11,334 new vulnerabilities were discovered
in the WordPress ecosystem in 2025.
Every completed scan generates an embeddable security score badge. Drop it on your README, status page, or footer. Here's what ours looks like:
Embed your DygDog score on your README, status page, or marketing site. One-click copy in the snippet format you need.
[](https://dyg.dog)<a href="https://dyg.dog"><img src="https://dyg.dog/api/badge/dyg.dog" alt="DygDog Security Score" /></a>Badge updates automatically after each scan. Clicking it takes visitors to your latest security report.
No plugin install. No FTP credentials. No admin access. Enter your domain and get a comprehensive WordPress security report immediately.