[WordPress Security] Open-Source Projects Use the Wordfence Vulnerability Data Feed API and You Can Too!

From: Wordfence <list_at_wordfence.com>
Date: Thu, 6 Jul 2023 10:30:49 -0700

Celebrating 6 months of free access to the Wordfence Threat Intelligence Vulnerability Feed by showcasing innovative projects using our API.

Wordfence-Logo.png (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VWqt_x4Mhp3hN23xqyf8pmXPW3Dl4Sm50Gfx7N3S9PFX3kWDcV1-WJV7CgGnbW4CFd4t7_rLVjW5hGjvX7f6mvxN4ltBBCFMn1sW36XWjS1kFBKLW78bvnC1_8bv5W7Ww1Pl8F7CVHT4Q2j7Tz6cPW28CyJX4hWn01W8wjnNq4PDnzcW1VnBMy3bslG7W7G3R6t5XkVSLW8fjHWN1P9vc5W6HZ5c06hqPKnVVxs6p6yd13WW4X6q4z8vdb9zVdP3vb4mgHdr33xy1 )

wordfence_vuln_data_feed_api_blogpost_FeaturedImage (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VWqt_x4Mhp3hN23xqyf8pmXPW3Dl4Sm50Gfx7N3S9PH_3kWGhV1-WJV7Cg-5tVBg7qV7qKx2pN44dTlysHpTcW73JST-9hfHt0W3SJy8w1YJD0kW7K-2c-4WhhpxW3pp55c52W9yWW92vN448zhZJVW1dhJD68w5fCsW5wJRhY5FrNhXW4Hg3VZ6mG8WyW7VVkZH9cKn5WW6q6kLY6Wfb_1W2lZHFJ340zGTW3MZYVQ8GRrKcW4sjNL734y2pfW1GtS8W5-4lsXW4LVCkm3jLkbWW8D9-xG6Zv4FmW5DvQnV1XSBVRW7t4y7M3qSncKW1-51tP6ZbQknW6yM7gv1JDzW5W1Nrxkq5hw5FTW43DCQ1870vPqW6SM9s33Y94dQW1DZ8XZ3tKXHbVV-LM08ggR32W5y12c_5KxSjJW7x7wr62fXmWwW8TR6Gm4ng9K833pN1 )

Prior to joining the Wordfence Threat Intelligence team, I spent several years as a vulnerability analyst, responsible for collecting, analyzing, and curating every publicly disclosed vulnerability. This meant collecting vulnerability information from almost a hundred different, disparate sources. As you can imagine, this was quite the challenge as each and every data source came with its own set of quirks:

- Were we legally allowed to use the data in our own product?
- Did we need special authentication/authorization to access the data?
- Was the data presented in an easy to consume, machine readable format?
- How often would the format change, and how would that disruption affect us?

Some sources were gracious enough to provide easy-to-consume data, usually in the form of an XML feed or Common Vulnerability Reporting Format (CVRF), but these were the exception rather than the rule.

At Wordfence, we not only provide our curated WordPress vulnerability database (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VWqt_x4Mhp3hN23xqyf8pmXPW3Dl4Sm50Gfx7N3S9PGw3kWDQV1-WJV7CgWcsW1DFqG622V2mNW6651FM4nxbPTW47bwVw7gJfDtW7h7yrb1C_vh3W2bDmw05pjGytW41j2XZ1wvSc6W7qBlP35d6--WW4F49QY985jd6W43pwLh6cYSW_W6pd4hl98gm8PN4T2669v5VC0W1XYBxX9lCfy5W36dJxP3Mv8DDW1lVJPq7qZgCRW59mss78B8v_kW6JSrZV3zlPSKW8wywyz4y91dvN4Dh-b8mP2r5W36mKS63Mz_fpW45kHvr1KmYSr37wQ1 ) for free, but we also provide a fully featured, completely unrestricted API (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VWqt_x4Mhp3hN23xqyf8pmXPW3Dl4Sm50Gfx7N3S9PHJ3kWF_V1-WJV7CgVDYW1t6kmk9lrRfKW7MXR9k8vq29cW4LcJ7Y3wyMs6W8wK1wK6vzBhWW6Kx9F_72LqQ9V165-Y7T0w1LW2jt_-g6lP75BW1vjTqN8Jc0NNW200dnq1pq2YtV5bf1p5NKVdcW69YBN_4J8HWmW7P2hlW40Rb8PW5xxr0C1DcHM8W7dJfzr12H5YxW2-GyTK8fgh4GW84RhC042QNyCW3Krc9s1lhJ3_W8qSgzy6_VC88VVR5vv3QggSFW63LwF_3vps53W12-MMk7xD5yMW2YMKH57cjLZ-W6D6ypb1Dj-WQW2wH4yj9dtbJTW1mvQ-c8XGv43VGYlSW2KpwhDW5vRzCB1cyQsXW2T-1G41Pn_9N39lv1 ) to leverage this data for your own needs. Whether you’re a security or vulnerability analyst, penetration tester, data scientist, cyber-hobbyist, or even a commercial for-profit organization, you can use our data at no cost!

READ THIS POST ON THE BLOG
(https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VWqt_x4Mhp3hN23xqyf8pmXPW3Dl4Sm50Gfx7N3S9PH_3kWGhV1-WJV7Cg-5tVBg7qV7qKx2pN44dTlysHpTcW73JST-9hfHt0W3SJy8w1YJD0kW7K-2c-4WhhpxW3pp55c52W9yWW92vN448zhZJVW1dhJD68w5fCsW5wJRhY5FrNhXW4Hg3VZ6mG8WyW7VVkZH9cKn5WW6q6kLY6Wfb_1W2lZHFJ340zGTW3MZYVQ8GRrKcW4sjNL734y2pfW1GtS8W5-4lsXW4LVCkm3jLkbWW8D9-xG6Zv4FmW5DvQnV1XSBVRW7t4y7M3qSncKW1-51tP6ZbQknW6yM7gv1JDzW5W1Nrxkq5hw5FTW43DCQ1870vPqW6SM9s33Y94dQW1DZ8XZ3tKXHbVV-LM08ggR32W5y12c_5KxSjJW7x7wr62fXmWwW8TR6Gm4ng9K833pN1 )

Celebrating 6 Months of Free Access to the Wordfence Threat Intelligence Vulnerability Feed

We’re marking the 6-month anniversary of our free Wordfence Threat Intelligence Vulnerability Feed by showcasing some of the most innovative projects that are using our API. Check them out and get inspired to create your own!

WP-CLI Vulnerability Scanner

https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VWqt_x4Mhp3hN23xqyf8pmXPW3Dl4Sm50Gfx7N3S9PGw3kWDQV1-WJV7CgDgxN7g7jqW2sv06Vv_bZZ2BPCXwW51mRJp4DGrsSN3fz2d22KrpFN8KZ4Kjl11t6N4Yjzr1XcY22W8ZwLth6Tz6RZW79kl3w8ZdX3pW7hTjGQ9fz3SHW7Hq7HY508t1WW2zgStf8QmvbWW4TSVxq8V8CHkW5lsCtz2jJ4sJW1st-zk7Zvx3GW8p1-bJ4FPCvzW8yYMvX3jsfsYW3jkpWx8C9btjW7Kdks57Ns-RJW5XDP685CjRB5W38092T8mCv9j3p7h1

The WP-CLI Vulnerability Scanner is a tool developed by 10up. It’s designed to check for vulnerabilities in WordPress core, plugins, and themes. The tool allows users to choose their preferred vulnerability database for scanning. Among the options, which include WPScan and Patchstack, the Wordfence Vulnerability Data Feed stands out. Wordfence is the only vulnerability database that offers free access without the need for an API token.

The WP-CLI Vulnerability Scanner can be installed as a WP-CLI package or as a regular WordPress plugin, and it provides a variety of output formats. You can schedule it to run regular scans, ensuring your WordPress site remains secure. The project is actively maintained by 10up.

wpcli-vulnerability-scanner (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VWqt_x4Mhp3hN23xqyf8pmXPW3Dl4Sm50Gfx7N3S9PH_3kWGhV1-WJV7Cg-5tVBg7qV7qKx2pN44dTlysHpTcW73JST-9hfHt0W3SJy8w1YJD0kW7K-2c-4WhhpxW3pp55c52W9yWW92vN448zhZJVW1dhJD68w5fCsW5wJRhY5FrNhXW4Hg3VZ6mG8WyW7VVkZH9cKn5WW6q6kLY6Wfb_1W2lZHFJ340zGTW3MZYVQ8GRrKcW4sjNL734y2pfW1GtS8W5-4lsXW4LVCkm3jLkbWW8D9-xG6Zv4FmW5DvQnV1XSBVRW7t4y7M3qSncKW1-51tP6ZbQknW6yM7gv1JDzW5W1Nrxkq5hw5FTW43DCQ1870vPqW6SM9s33Y94dQW1DZ8XZ3tKXHbVV-LM08ggR32W5y12c_5KxSjJW7x7wr62fXmWwW8TR6Gm4ng9K833pN1 )

Nuclei + Wordfence

https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VWqt_x4Mhp3hN23xqyf8pmXPW3Dl4Sm50Gfx7N3S9PGw3kWDQV1-WJV7CgH92W3C1sjx8LgFc4W6Lh0gg825b3hW36DD4r3mbwXWW1Y2K5B42sfZrW8pcTnk31cz0SW7hNR0v9k2cjsW1zlf5Q8NY3kQW8CM_Hl7qrjYHN8FbwsxQb4b5N2B3Tzdlv13CW3sPS0z1SkSl2W3-Mv7m8S0J9BW1z9Dfy7HdnqZW98wKvg33-Ll9W6pqfpg4RscKbW3xlyk_39KL4-W45nldY7wSNkCW33rYL44HQ2gHW3Wbhb56TswhHW4-7whF6Trj7D3mNg1

The Nuclei + Wordfence project, developed by topscoder, offers a large collection of Nuclei templates for scanning WordPress for vulnerabilities. The templates are based on vulnerability reports from Wordfence. The project provides over 8000 templates, primarily focused on WordPress plugins, but also covering themes and core vulnerabilities. To use the templates, users need to install Nuclei and this repository. The project provides examples of commands for scanning for specific vulnerabilities or focusing on critical ones.

nuclei-wordfence-2 (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VWqt_x4Mhp3hN23xqyf8pmXPW3Dl4Sm50Gfx7N3S9PH_3kWGhV1-WJV7Cg-5tVBg7qV7qKx2pN44dTlysHpTcW73JST-9hfHt0W3SJy8w1YJD0kW7K-2c-4WhhpxW3pp55c52W9yWW92vN448zhZJVW1dhJD68w5fCsW5wJRhY5FrNhXW4Hg3VZ6mG8WyW7VVkZH9cKn5WW6q6kLY6Wfb_1W2lZHFJ340zGTW3MZYVQ8GRrKcW4sjNL734y2pfW1GtS8W5-4lsXW4LVCkm3jLkbWW8D9-xG6Zv4FmW5DvQnV1XSBVRW7t4y7M3qSncKW1-51tP6ZbQknW6yM7gv1JDzW5W1Nrxkq5hw5FTW43DCQ1870vPqW6SM9s33Y94dQW1DZ8XZ3tKXHbVV-LM08ggR32W5y12c_5KxSjJW7x7wr62fXmWwW8TR6Gm4ng9K833pN1 )

wpfinger

https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VWqt_x4Mhp3hN23xqyf8pmXPW3Dl4Sm50Gfx7N3S9PGc3kWDwV1-WJV7CgY78W64rFH9379vYdW6XvlGr3vm21JW4qk-5x28FP6-W8lFjLc63tvWyW2-BbtS7vvHBmN5KNfbq9Qdd1W229kFW6Rsl_9VvMGgX4Trg8tW15kBCx981fTDW5Z0MZ21Z_Tt0W8b-RCM7YsPcgW3ClzW-1gh2nLW4Xx0DY37Z_srW18RF0c5ncWqWW6QzhfN45l9GrW2FDlyf2h-nsmW3-lX-h3H5MjJW20CXMY31W9lk361r1

wpfinger is a WordPress scanning tool designed for red team operations. It offers several features, including:

- Detection of WordPress core versions
- Plugin scanning through fingerprinting
- Vulnerability output, using the database from Wordfence

The tool provides options to scan for all plugins or only those that are vulnerable. You can install wpfinger either from pre-built binaries available on the project’s GitHub Releases page or directly from the source code.

wpfinger_scan_2 (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VWqt_x4Mhp3hN23xqyf8pmXPW3Dl4Sm50Gfx7N3S9PH_3kWGhV1-WJV7Cg-5tVBg7qV7qKx2pN44dTlysHpTcW73JST-9hfHt0W3SJy8w1YJD0kW7K-2c-4WhhpxW3pp55c52W9yWW92vN448zhZJVW1dhJD68w5fCsW5wJRhY5FrNhXW4Hg3VZ6mG8WyW7VVkZH9cKn5WW6q6kLY6Wfb_1W2lZHFJ340zGTW3MZYVQ8GRrKcW4sjNL734y2pfW1GtS8W5-4lsXW4LVCkm3jLkbWW8D9-xG6Zv4FmW5DvQnV1XSBVRW7t4y7M3qSncKW1-51tP6ZbQknW6yM7gv1JDzW5W1Nrxkq5hw5FTW43DCQ1870vPqW6SM9s33Y94dQW1DZ8XZ3tKXHbVV-LM08ggR32W5y12c_5KxSjJW7x7wr62fXmWwW8TR6Gm4ng9K833pN1 )

Accessing and Consuming the Vulnerability Data Feed via API

Accessing the Wordfence Vulnerability Data Feed API is straightforward and does not require any authentication. There are two versions of the feed available to support different use cases:

1. Production Feed: This feed provides data about vulnerabilities for which complete details are available. It may not include all records that are available in the Scanner Feed. You can access the Production Feed with the following GET request:

GET /api/intelligence/v2/vulnerabilities/production

Host: www.wordfence.com

2. Scanner Feed: This feed contains only detection information and includes new vulnerabilities that do not yet have enough information to be included in the Production Feed. You can access the Scanner Feed with the following GET request:

GET /api/intelligence/v2/vulnerabilities/scanner

Host: www.wordfence.com

Both feeds return the complete feed and do not accept any additional parameters. The data is provided in JSON format, with the root element being an object where the keys are UUIDs assigned by Wordfence to each vulnerability. This allows flexibility in parsing the feed; it can easily be loaded into either a map (keyed by UUID) or just a sequential array, depending on how the data is to be used.

More details can be found via the API documentation (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VWqt_x4Mhp3hN23xqyf8pmXPW3Dl4Sm50Gfx7N3S9PHJ3kWF_V1-WJV7CgVDYW1t6kmk9lrRfKW7MXR9k8vq29cW4LcJ7Y3wyMs6W8wK1wK6vzBhWW6Kx9F_72LqQ9V165-Y7T0w1LW2jt_-g6lP75BW1vjTqN8Jc0NNW200dnq1pq2YtV5bf1p5NKVdcW69YBN_4J8HWmW7P2hlW40Rb8PW5xxr0C1DcHM8W7dJfzr12H5YxW2-GyTK8fgh4GW84RhC042QNyCW3Krc9s1lhJ3_W8qSgzy6_VC88VVR5vv3QggSFW63LwF_3vps53W12-MMk7xD5yMW2YMKH57cjLZ-W6D6ypb1Dj-WQW2wH4yj9dtbJTW1mvQ-c8XGv43VGYlSW2KpwhDW5vRzCB1cyQsXW2T-1G41Pn_9N39lv1 ) .

Conclusion

If you’re interested in acquiring high quality vulnerability data for use in your project, it can be a difficult and time consuming proposition. As leaders in WordPress cybersecurity, Wordfence knows that vulnerability data comes from the research community, and should therefore be a community resource. We hope these projects inspire you to create your own tools using our free Wordfence Vulnerability Data Feed API. We can’t wait to see what you come up with! Share your projects with us at wfi-support_at_wordfence.com (mailto:wfi-support_at_wordfence.com) .

The Full Product Lineup:

wf-stacked-free-1 (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VWqt_x4Mhp3hN23xqyf8pmXPW3Dl4Sm50Gfx7N3S9PGw3kWDQV1-WJV7CgY3VW45tglR4XnXMrW5XDm287fgH_SVvN9S94fHpvdW2807hf3F2HWtW8gMws43bk0_nW542_rJ668_4-W8d41Fp755VcnW47Hg7W4t9Bs6W2YtpDs2CJlTzW7Rhx2z3Q1l6wW3hsV4X7F5JMWW1Zn-Qg6sR8bSW4fbtD44fq9gWW4TlwGP98r5g7W1dXvcr4dcpQcW50C85K8xMLxHW4VyhsB6fnB1TW7BrMtT5-V7CDW7lXmHr3rBQrSN8qvnR1H4VWk3nbY1 )

wf-stacked-premium-1 (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VWqt_x4Mhp3hN23xqyf8pmXPW3Dl4Sm50Gfx7N3S9PGw3kWDQV1-WJV7CgD0gW8lnkDr9dSrh1W1y9Ksg5BDTRDW1sgKrT72h_HPW26R1495fMXK1W8QP6mF4W1GhXW7jztpn7Gt5bkN3BW-SNgKxgHVpNsgF4Lnn3kW9lxrdz37n2wxW9c6j8c3XQ8x0W8XPFMZ1smjyjW6BymNV1y4-WmW3PxbR08zLkkPW71pH6K3ScWBvW3Sbh_12lljC_VB77LP4yVrJ4W5fvTGg9cPpCTW1rL82v6YQ4sKN1v814KJXrndN8TsFmDMmsDP33tB1 )

wf-stacked-care-3 (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VWqt_x4Mhp3hN23xqyf8pmXPW3Dl4Sm50Gfx7N3S9PGw3kWDQV1-WJV7CgLMyN4FJPfrQcywxW7NLV497Hxh29W65fHcX8g33XqW1fwqDh3HNm_fW1TW91j2HJR-lW2jMFWK6ssMG8W1RjwGm5gncFdN1nf8-_ChQGFN8qtM11-tmWrN1Yjkv2XGzVCVc4sQR49fWFBW8SQgzK2Nv7WHV4YjgN6PFQrGW2Dy9xf50t3FsW4S8BQj2FD_tTW8CXLjy8Vpqz4W8X97dm8SwN0lW98TWKb5zzFxYN5PxJJPVS8JjW1zS8qs4r1tHT3pyf1 )

wf-stacked-response-2 (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VWqt_x4Mhp3hN23xqyf8pmXPW3Dl4Sm50Gfx7N3S9PGw3kWDQV1-WJV7CgFFyW66nrRl7S8yssW8kYMbV6Zpw99N6ZCqshkP_kHW1SvTx228tccNW83MY-43nqs0fW8WnqxM1XDjvsVjh_HY4B7j9kW2CLV-n6XkRQ-W98zTLn37R_CqW6M090H94P1QjW2RC6ZC6jKvrkW88pH0s7vH8fxW6J276J8QX9TzVnpsbS3yj4qmN8pf9YG6pcMyN7pCWwKYS9KzW5WjS7712CBRGW4t37mT8MLQbBW5DlNHP2qckrqW5KgcmF3V3zbS39kR1 )

wf-logo-intelligence-h-800 (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VWqt_x4Mhp3hN23xqyf8pmXPW3Dl4Sm50Gfx7N3S9PGc3kWDwV1-WJV7CgMKmW10rBLf2XR26tW6B96ZJ94TXplW8fh_Zp182CTZW5DFJ2836ZsCJW5jpTqQ67GhbxW8PNB699fv0NsW38Jf3f64CKzXW20ztmN3vHfjmN48ZFDPWhyrdW11H30l3GrnXCW7KFwzw17xmZvW84ZWQy4szwYxW5CfqSb59X2zvVFq_lg3MKqX_W5-FSrC36p88DW2B38SV5mWSs4W5Dtw9h5pxg-7W1Z9dDY7bqyxC33GJ1 )

logo-defiant (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VWqt_x4Mhp3hN23xqyf8pmXPW3Dl4Sm50Gfx7N3S9PFX3kWDcV1-WJV7CgKfZW7TflJC6TFpL4W2qpZ_n6fbnqBN1TjhLV_VgLZW1wDSdn5rLzy_W2rWz0Q3c5X2LW32TVTB5c1KSMN6r_9vz6HyTJVKMKCv6jN8B8W4m8b2y4By8zlW9k08-K7lW3gmW6kCsDh1hl-h8VMNtVk82wHHMMbZ7vrf0v56W8bGTCT5vdpNbW1cYMLb3TkC18W4VZnZ13c5hFp3qcP1 )

Defiant, Inc., 1700 Westlake Ave N STE 200, Seattle, WA 98109, United States

Unsubscribe (https://email.wordfence.com/hs/manage-preferences/unsubscribe-all?languagePreference=en&d=Vn9bTK892TtnVsxx1M3JN_XyW41Rcn-4h29fmN6J4V3XmWFfSW7l5Rtq8cCS_nV25wjq6bJ9ZYN7jsMMkX8rxCN8f3NVdXk_7QVbw9fZ1XjBnyN7T6ffspl37yw7b2H8djpp2&v=3&_hsenc=p2ANqtz-9DBe9Y-FD2clhQakaHax2j9iKc9sTI4xa3K1M0JwpQhu0qzMAQG-YDyVq5VMD46V9-ffF1uoZGvqzl968CG8gq-BMlzA&_hsmi=265342447 )

Manage preferences (https://email.wordfence.com/hs/manage-preferences/unsubscribe?languagePreference=en&d=Vn9bTK892TtnVsxx1M3JN_XyW41Rcn-4h29fmN6J4V3XmWFfSW7l5Rtq8cCS_nV25wjq6bJ9ZYN7jsMMkX8rxCN8f3NVdXk_7QVbw9fZ1XjBnyN7T6ffspl37yw7b2H8djpp2&v=3&_hsenc=p2ANqtz-9DBe9Y-FD2clhQakaHax2j9iKc9sTI4xa3K1M0JwpQhu0qzMAQG-YDyVq5VMD46V9-ffF1uoZGvqzl968CG8gq-BMlzA&_hsmi=265342447 )

You're receiving this email because you signed up to the Wordfence WordPress security mailing list.
Received on Thu Jul 06 2023 - 19:30:52 CEST

This archive was generated by hypermail 2.3.0 : Thu Jul 06 2023 - 19:32:58 CEST