WPScan – WordPress Security Scanner


The WPScan WordPress Security Scanner plugin scans your system on a daily basis to find security vulnerabilities listed in the WPScan Vulnerability Database. It shows an icon on the Admin Toolbar with the total number of security vulnerabilities found.

The WPScan Vulnerability Database is a WordPress vulnerability database, which includes WordPress core vulnerabilities, plugin vulnerabilities and theme vulnerabilities. The database is maintained by the WPScan Team, who are 100% focused on WordPress security.

To use the WPScan WordPress Security Plugin you will need to use a free API token by registering here.

Was macht dieses Plugin?

  • Scans the WordPress core, plugins and themes for known security vulnerabilities;
  • Shows an icon on the Admin Toolbar with the total number of security vulnerabilities found;
  • Notifies you by mail when new security vulnerabilities are found.

Mehr erfahren


  • Liste der Sicherheitslücken und Symbol in der Adminleiste.
  • Benachrichtigungs-Einstellungen.
  • Site health page.


  1. Lade wpscan.zip-Inhalte ins /wp-content/plugins/-Verzeichnis
  2. Aktiviere das Plugin im ‚Plugins‘-Menü von WordPress
  3. Melde dich an, um ein kostenloses API-Token zu erhalten
  4. Save the API token to the WPScan settings page or within the wp-config.php file


  • How can I configure the API token in the wp-config.php file?

To configure your API token in the wp-config.php file, use the following PHP code: define( 'WPSCAN_API_TOKEN', '$your_api_token' );

  • How many API calls are made?

    There is one API call made for the WordPress version, one call for each installed plugin and one for each theme. By default there is one scan per day. The number of daily scans can be configured when configuring notifications.

  • Why is the „Summary“ section and the „Check Now“ button not showing?

    The cron job did not run, which can be due to:

    • The DISABLE_WP_CRON constant is set to true in the wp-config.php file, but no system cron has been set (crontab -e).
    • A plugin’s caching pages is enabled (see https://wordpress.stackexchange.com/questions/93570/wp-cron-doesnt-execute-when-time-elapses?answertab=active#tab-top).
    • The blog is unable to make a loopback request, see the Tools->Site Health for details.
      If the issue can not be solved with the above, putting define(‚ALTERNATE_WP_CRON‘, true); in the wp-config.php
      could help, however, will reduce the SEO of the blog.


5. Mai 2020
WPScan makes all the other security plugins I needed, obsolete! lightweight and regular updates, i expected to pay for but they are included! super easy to use! security in seconds!
5. Mai 2020
WPScan is a great plugin, easy to use and works very well! Fantastic team behind it!
Lies alle 13 Rezensionen

Mitwirkende & Entwickler

„WPScan – WordPress Security Scanner“ ist Open-Source-Software. Folgende Menschen haben an diesem Plugin mitgewirkt:


„WPScan – WordPress Security Scanner“ wurde in 5 Sprachen übersetzt. Danke an die Übersetzerinnen und Übersetzer für ihre Mitwirkung.

Übersetze „WPScan – WordPress Security Scanner“ in deine Sprache.

Interessiert an der Entwicklung?

Durchstöbere den Code, sieh dir das SVN Repository an oder abonniere das Entwicklungsprotokoll per RSS.



  • Add scanning interval option to settings page
  • Some other small improvements


  • Show severity ratings for Enterprise users
  • Show Plugin Closed label
  • Add PDF report download
  • Add account status meta box
  • Add support for API token constant in wp-config.php file
  • Show vulnerabilities in Site Health
  • Update menu icon to monochrome


  • Updated text and messages to reduce confusion
  • Removed WPScan_JWT class as no longer required


  • Use the new slug helper method on all items on the page


  • Better slug detection before calling the API


  • Prevent multiple tasks to run simultaneously
  • Check Now Button disabled and Spinner icon displayed when a task is already running
  • Results page automatically reloaded when Task is finished (checked every 10s)


  • Use the /status API endpoint to determine if the Token is valid. As a result, a call is no longer consumed when setting/changing the API token.
  • Trim and remove potential leading ‚v‘ in versions when comparing then with the fixed_in values.


  • Hinweis auf kostenpflichtige API


  • Warnung bei Überschreitung des API Limits


  • Erste Veröffentlichung.