7,966 new security vulnerabilities were discovered in the WordPress ecosystem in 2024. That’s a 34% increase from the previous year (Patchstack). Before you panic and start looking for alternatives, here’s what those numbers mean for your business.
The headline sounds alarming. But 96% of those vulnerabilities were in plugins alone, not WordPress itself (SecurityWeek). WordPress core hasn’t had a major security vulnerability since 2017. The platform isn’t the problem. How people use it is.
In this guide:
- Does WordPress Have Security Issues?
- Where Vulnerabilities Really Come From
- The Plugin Problem Nobody Talks About
- Current Threat Landscape: 2025
- Hosting: The Overlooked Risk Factor
- Security Measures That Work
- When WordPress Isn’t the Answer
- Making an Informed Decision
If you’re currently dealing with a compromised site, our WordPress Site Hacked recovery guide covers immediate actions and cleanup procedures.
Does WordPress Have Security Issues?
Yes and no. The honest answer depends on what you mean by “WordPress.”
WordPress core software is maintained by a dedicated security team of approximately 50 experts, including lead developers and security researchers (WordPress.org). When vulnerabilities are discovered, patches typically arrive within hours. The rapid release cycle - major updates every four months, minor security updates every two weeks - means issues get fixed faster than most closed-source platforms can match.
The numbers tell the story. Of those 7,966 vulnerabilities discovered in 2024:
| Source | Percentage |
|---|---|
| Plugins | 96% |
| Themes | 4% |
| WordPress Core | Less than 0.1% (7 total) |
So when someone says “WordPress has security issues,” they’re usually talking about the ecosystem around WordPress, not the platform itself.
Why This Distinction Matters
Your risk profile depends entirely on how your site is built and maintained. A WordPress site running core software with minimal, well-maintained plugins is significantly more secure than one loaded with abandoned plugins and outdated themes.
The Melapress Security Survey 2025 found that 64% of WordPress users had experienced at least one security breach. When you broaden the definition to include minor incidents like phishing attempts or automated login attacks, that number jumps to 96%.
These statistics aren’t unique to WordPress. Any platform powering 43% of the web becomes a target. The difference is whether you’re running a well-maintained installation or leaving the digital equivalent of your front door unlocked.
Where Vulnerabilities Really Come From
Understanding the actual attack vectors helps you focus your security efforts where they matter. The data consistently points to the same culprits.
Stolen Credentials
The biggest threat isn’t sophisticated code exploits. Analysis of 111,000 infected WordPress sites in 2025 found that 81% of infections came from stolen credentials or hijacked authentication cookies (WeWatchYourWebsite). Attackers aren’t breaking down the door. They’re walking through it with a key.
Where do they get credentials?
- Infected personal computers harvesting saved passwords
- Password reuse from previous data breaches
- Phishing attacks targeting site administrators
- Brute force attacks against weak passwords
- FTP credentials transmitted over unencrypted connections
The uncomfortable truth: your personal computer security directly affects your website security. A compromised laptop can hand over your WordPress login, FTP credentials, and hosting access in one breach.
Plugin Vulnerabilities
Cross-site scripting (XSS) vulnerabilities account for approximately 50% of all plugin security issues (Patchstack). These allow attackers to inject malicious scripts that execute when visitors view affected pages.
Broken access control and cross-site request forgery (CSRF) round out the top three, followed by data exposure, SQL injection, and arbitrary file upload vulnerabilities.
The concerning part isn’t that vulnerabilities exist. It’s what happens after they’re discovered.
The Disclosure Problem
More than half of plugin developers who were notified about vulnerabilities in 2024 didn’t patch the issue before public disclosure (Patchstack). Once a vulnerability is public, attackers start scanning for vulnerable sites immediately.
In some cases, exploitation begins within an hour of disclosure. Automated bots scan millions of WordPress sites looking for specific vulnerable plugins. When they find one, they exploit it automatically.
This creates a race condition where patch availability doesn’t equal patch deployment. Your site could be running a plugin with a known vulnerability and a patch available, but if you haven’t updated, you’re still exposed.
The Plugin Problem Nobody Talks About
Plugins are WordPress’s greatest strength and its biggest security liability. The flexibility they provide comes with real risks that most security guides gloss over.
Abandoned Plugins
827 plugins and themes were reported as abandoned in 2024 (Fix My Site). These are plugins that no longer receive updates. Any vulnerabilities discovered after abandonment will never be patched.
The problem is worse than it appears. In 2024, 1,614 plugins were removed from the WordPress repository due to security concerns. Of these, 1,450 were classified as high or medium-priority vulnerabilities (Patchstack/Sucuri). Many of these plugins still have active installations on live websites.
Signs a plugin might be abandoned:
- No updates in 12+ months
- Unanswered support forum threads
- “Tested up to” shows WordPress version 2+ years old
- Developer’s website is down or for sale
- Compatibility warnings in the WordPress dashboard
Popular Plugins Aren’t Safe Either
Name recognition doesn’t guarantee security. In 2024, the LiteSpeed Cache plugin - active on 5 million websites - had a critical vulnerability discovered (CVE-2024-44000). Popular plugins like Elementor, WPForms, and Essential Addons for Elementor have all had vulnerabilities disclosed in 2025.
The vulnerability data from July 2025 alone included issues in:
- Elementor (10 million+ installations)
- WPForms (6 million+ installations)
- Essential Addons for Elementor (2 million+ installations)
- Premium Addons for Elementor (700,000+ installations)
Active development and a large user base mean these plugins get patched quickly. But between vulnerability discovery and patch deployment, millions of sites are potentially exposed.
AI-Generated Plugin Code
A joint report from Patchstack and Sucuri flagged an emerging concern: AI-generated plugins with security flaws. As more developers use generative AI to create WordPress plugins, the security of that code has become questionable. Negligence or overreliance on AI-generated code without proper security review is introducing vulnerabilities at an increasing rate.
Current Threat Landscape: 2025
The types of attacks haven’t fundamentally changed. How attackers execute them has evolved significantly.
AI-Driven Attacks
Attackers now use machine learning models to identify vulnerabilities at scale and adapt their tactics in real time. Automated bots can attempt thousands of different exploits simultaneously, testing your site’s defences faster than any human could.
A cyber threat report by Trellix documented a noticeable increase in AI-driven attacks specifically targeting WordPress vulnerabilities. Mass scanning that once took days now takes minutes.
Attack Patterns by the Numbers
| Vulnerability Type | Percentage |
|---|---|
| Cross-Site Scripting (XSS) | ~50% |
| Broken Access Control | 15-20% |
| Cross-Site Request Forgery (CSRF) | 15% |
| SQL Injection | 2-5% |
| Arbitrary File Upload | 2-5% |
43% of WordPress vulnerabilities discovered in 2024 could be exploited without any authentication (Patchstack). This means attackers don’t need to guess passwords or steal credentials. They can exploit these vulnerabilities against anyone who visits the site.
Common Malware Types
Once attackers gain access, what do they do? The Sucuri SiteCheck data shows:
| Malware Type | Prevalence |
|---|---|
| SEO spam injection | 55.4% |
| Injected malware (scripts, redirects) | 34.1% |
| Backdoors | Installed in most infections |
SEO spam hijacks your domain authority to rank attacker-controlled content. Your site might look normal to you while serving pharmaceutical spam to search engines - destroying your rankings while you’re unaware.
Hosting: The Overlooked Risk Factor
Your hosting environment matters more than most business owners realise. The same WordPress installation can be secure or vulnerable depending on where and how it’s hosted.
Shared Hosting Risks
Shared hosting means multiple websites run on the same server. If one site on that server is compromised, attackers may be able to access other sites on the same account - or potentially the same server.
FTP vulnerabilities compound this risk. Standard FTP transmits credentials in plain text, meaning anyone monitoring network traffic can intercept your username and password. SFTP encrypts this connection, but many hosts still default to plain FTP.
What Good Hosting Provides
| Feature | Why It Matters |
|---|---|
| Account isolation | One breach doesn’t spread to others |
| Malware scanning | Detects infections before they spread |
| Web Application Firewall | Blocks common attack patterns |
| SFTP (not FTP) | Encrypts credential transmission |
| Automatic backups | Recovery option when things go wrong |
| PHP version management | Newer versions include security fixes |
Server-Level Security
Even with a secure WordPress installation, your site is vulnerable if the underlying server isn’t properly configured. Outdated PHP versions, missing security headers, and misconfigured file permissions create attack surfaces that WordPress itself can’t address.
As of 2025, anything below PHP 8.0 is either near end-of-life or already unsupported. Running older PHP versions means missing critical security patches at the server level.
Security Measures That Work
Most security advice focuses on the obvious. Updates. Strong passwords. Security plugins. That’s table stakes. Here’s what moves the needle.
Two-Factor Authentication
Reduces unauthorised logins by approximately 73% (Sucuri). This single measure addresses the biggest threat vector - stolen credentials - directly. Even if attackers have your password, they can’t access your site without the second factor.
WordPress doesn’t include 2FA natively. You’ll need a plugin. The Melapress Security Survey found that while most respondents were concerned about security breaches, only a fraction had implemented 2FA.
Web Application Firewall (WAF)
87.8% of exploits bypass standard hosting defences (Patchstack). A WAF sits between attackers and your site, filtering malicious requests before they reach WordPress.
Options range from plugin-based firewalls (Wordfence, Sucuri) to cloud-based solutions (Cloudflare, Sucuri CDN). Cloud-based WAFs have the advantage of blocking attacks before they hit your server at all.
The Update Reality
Keeping everything updated sounds simple. The reality is more complex.
Updates fix known vulnerabilities. But 33% of WordPress vulnerabilities disclosed in 2024 were never patched - the plugins were abandoned. Auto-updates only help if updates exist.
Before enabling auto-updates across the board, consider:
- Testing updates in a staging environment first
- Having a backup strategy in case updates break functionality
- Monitoring which plugins are still maintained
- Reviewing your plugin list for abandoned tools
Security Plugin Limitations
Security plugins help. They’re not magic. Modern malware actively disables security plugins to stay hidden.
The 2025 analysis of infected WordPress sites found that every single one had at least one active security plugin installed. Nearly 20% had two security plugins running simultaneously. The sites were compromised anyway.
Security plugins are one layer of defence. Relying on them as your complete security strategy leaves gaps that attackers exploit.
High-Impact Checklist
If you’re securing a WordPress site today:
- Enable two-factor authentication for all admin accounts
- Switch from FTP to SFTP
- Audit installed plugins - remove unused ones, check for abandonment
- Enable a Web Application Firewall
- Verify backups are running and test a restore
- Review user accounts and remove unnecessary admin access
- Update PHP to 8.0 or higher
- Check for “nulled” themes or plugins (pirated premium versions)
When WordPress Isn’t the Answer
Sometimes the honest recommendation is to use something else. WordPress is a powerful tool, but it’s not the right choice for every situation.
Signs You’ve Outgrown WordPress
Performance requirements exceed what WordPress can efficiently deliver. High-traffic sites with complex dynamic content might benefit from purpose-built solutions.
Security requirements demand isolation from plugin ecosystems. If your business handles highly sensitive data with strict compliance requirements, a custom build with a smaller attack surface might make more sense.
The plugin dependency is creating maintenance burden. If you’re running 30+ plugins just to get basic functionality, the complexity introduces risk. Every plugin is a potential vulnerability vector.
E-commerce scale has exceeded WooCommerce capabilities. For high-volume stores with complex inventory management, dedicated e-commerce platforms often provide better performance and security out of the box. Shopify, for example, handles PCI compliance, security patches, and infrastructure scaling without requiring you to manage plugins or server configurations. The trade-off is flexibility - you’re working within their ecosystem rather than building your own. For businesses processing significant transaction volumes, that trade-off often makes sense.
WooCommerce combines WordPress’s plugin vulnerability risks with the additional attack surface of payment processing. Card testing attacks, checkout exploits, and payment gateway vulnerabilities add layers of complexity that dedicated e-commerce platforms handle at the infrastructure level. (For a detailed look at e-commerce fraud and prevention strategies, see our E-commerce Security guide.)
When WordPress Makes Sense
Despite the security challenges, WordPress remains a solid choice for many businesses when:
- Content management and regular publishing are core requirements
- Budget constraints favour open-source over proprietary platforms
- Customisation needs are well-served by the plugin ecosystem
- The team has WordPress expertise or can partner with specialists
- Security practices are taken seriously and followed consistently
The platform itself is secure. The question is whether your organisation can maintain a secure WordPress installation over time.
Making an Informed Decision
WordPress security isn’t a mystery. The data is clear about where risks come from and how to address them.
| Risk Factor | Impact | Mitigation |
|---|---|---|
| Stolen credentials | 81% of infections | 2FA, strong passwords, secure personal devices |
| Plugin vulnerabilities | 96% of security issues | Audit plugins, remove abandoned ones, keep updated |
| Hosting environment | Foundation of all security | Choose quality hosting with security features |
| Missing WAF | 87.8% exploit bypass | Implement firewall at plugin or CDN level |
| Outdated software | Known exploits available | Regular updates with testing |
The businesses that get compromised aren’t usually running sophisticated operations where attackers found novel vulnerabilities. They’re running outdated plugins, using weak passwords without 2FA, and hosting on cheap shared servers.
The Ongoing Nature of Security
Website security isn’t a one-time project. The threat landscape evolves. New vulnerabilities are discovered weekly. Plugins get abandoned. Your security posture degrades unless actively maintained.
This is where many businesses struggle. They implement security measures once, then assume the job is done. Six months later, three plugins have unpatched vulnerabilities, PHP is a version behind, and the security plugin they installed has stopped updating itself.
Where Three Lions Technology Fits
Security breaches don’t just compromise data. They destroy customer trust, tank search rankings, and create reputational damage that takes months to recover from. A single Google “This site may be hacked” warning can crater your traffic overnight. The business impact extends far beyond the technical cleanup. (For immediate response to a compromised site, see our WordPress Site Hacked recovery guide.)
Three Lions Technology works with businesses who recognise that security is foundational to everything else - brand reputation, site performance, customer confidence, and sustainable growth. Our approach combines cybersecurity expertise with practical web development, addressing both immediate security concerns and the underlying technology decisions that create or prevent vulnerabilities.
We help businesses:
- Audit existing WordPress installations for security gaps and performance bottlenecks
- Implement security hardening beyond standard plugin configurations
- Improve site performance - because slow sites lose customers regardless of security
- Make informed decisions about when WordPress is or isn’t the right platform
- Transition to more appropriate technology stacks when the business outgrows WordPress - whether that’s Shopify for e-commerce, a headless CMS for performance, or a custom build for specific requirements
- Maintain ongoing security monitoring and incident response
- Protect brand reputation through proactive security management rather than reactive crisis response
Not sure where your site stands? Our website security audit guide explains what’s involved in a proper assessment. Three Lions Technology also offers a free consultation to assess your current setup and identify priorities. No sales pitch - just an honest conversation about your business and what it needs.
Key Resources:
- WordPress Hardening Guide
- Patchstack Vulnerability Database
- Sucuri SiteCheck Scanner
- Have I Been Pwned
References:
- Patchstack (2025). “State of WordPress Security in 2025.” Annual analysis of WordPress vulnerabilities and ecosystem security.
- Patchstack & Sucuri (2025). Joint whitepaper on WordPress security trends.
- SecurityWeek (2025). “8,000 New WordPress Vulnerabilities Reported in 2024.” Analysis of vulnerability distribution.
- WeWatchYourWebsite/SolidWP (2025). “When Security Plugins Aren’t Enough.” Analysis of 111,354 infected WordPress websites.
- Melapress (2025). “WordPress Security Survey 2025.” Survey of WordPress professionals on security practices.
- Fix My Site (2025). “Is WordPress Safe? A Data-Driven Security Analysis for 2025.”
- Sucuri (2025). Monthly WordPress Vulnerability & Patch Roundups.
Related Articles
Website Security Audit: What Business Owners Need
A practical guide to website security audits for SMEs. Learn what's involved, what it costs, and how to protect your business.
WordPress Site Hacked: Complete Recovery Guide
Your WordPress site is hacked. Here's how to identify the infection, clean it properly, and stop it happening again.
Need Help with Your Security?
From emergency hack recovery to comprehensive security audits - our team is ready to protect your business.