Check your WordPress site for vulnerabilities against the WPScan Vulnerabilities Database API.
Clone or download
Fetching latest commit…
Cannot retrieve the latest commit at this time.
Type Name Latest commit message Commit time
Failed to load latest commit information.


This plugin checks your site for security vulnerabilities against the WPScan Vulnerability Database API.

Originally inspired by the Sensio Labs Security Checker and the Friends of PHP Security Advisories, which unfortunately do not track WordPress vulnerabilities.

A less intrusive alternative to the WPScan vulnerability scanner.

NOTE: This plugin does not verify the integrity of files on your server - it only checks installed packages by name/version against a list of known vulnerabilities provided by the WPScan API.


WordPress 4.7 or later, PHP 5.4 or later and Composer.


$ composer require ssnepenthe/soter


Once activated, this plugin will check your site against the WPScan API twice daily and notify you when vulnerabilties are detected.

The plugin is configurable by visiting settings > soter in wp-admin:

  • Notification frequency: Choose whether to receive notifications after every scan where vulnerabilities are detected or only to receive notifications when your sites status changes.
  • Ignored plugins and themes: Select any packages that should not be checked against the WPScan API. This is intended for custom packages which are not tracked by the API and therefore would generate unnecessary HTTP requests or possible false positives.
  • Send email notifications: Enable/disable email notifications.
  • Email address: Provide an email address to notify if other than your site administrator email.
  • Email type: Choose whether you prefer HTML or text emails.
  • Send Slack notifications: Enable/disable Slack notifications.
  • Slack WebHook URL: Provide a URL for a Slack "Incoming WebHook" integration if you wish to receive Slack notifications.


There are two ways to easily extend the functionality of this plugin.

Via Pimple

Use the Pimple extend() method to modify plugin services.

To add a new notifier, for example, you can extend notifier_manager.

This is the preferred method for adding new notifiers as it will automatically honor the frequency setting configured by the site admin.

class Sms_Notifier implements Soter\Notifier_Interface {
    public function is_enabled() {
        // Return boolean indicating whether this notifier is currently enabled.

    public function notify( Soter_Core\Vulnerabilities $vulnerabilities ) {
        // Build and send the message.

_soter_instance()->extend( 'notifier_manager', function( Soter\Notifier_Manager $manager, Pimple\Container $container ) {
    $manager->add( new Sms_Notifier );

    return $manager;
} );

Via WordPress hooks

In the process of scanning a site, each package is individually checked against the WPScan API.

After each package check is complete, the soter_package_check_complete action is triggered.

add_action( 'soter_package_check_complete', function( Soter_Core\Vulnerabilities $vulnerabilities, Soter_Core\Response $response ) {
    switch ( $response->get_package()->get_type() ) {
        case Soter_Core\Package::TYPE_PLUGIN:
            // ...
        case Soter_Core\Package::TYPE_THEME:
            // ...
        case Soter_Core\Package::TYPE_WORDPRESS:
            // ...
}, 10, 2 );

After all package checks are complete, the soter_site_check_complete action is triggered.

add_action( 'soter_site_check_complete', function( Soter_Core\Vulnerabilities $vulnerabilities ) {
    foreach ( $vulnerabilities as $vulnerability ) {
        // ...
} );


This plugin wouldn't be possible without the work of the WPScan team and their amazing WPScan Vulnerabilities Database.

The email templates for this plugin are created from the Postmark Transactional Email Templates which are released under the MIT license.


If it feels more appropriate to you to be checking your site from the command line, you're in luck! Soter Command is a companion package for WP-CLI that allows you to do just that.

There are also at least two similar command packages available on Github: