Popis
Vulnity Security brings enterprise-grade threat detection to WordPress. It connects your site to Vulnity’s SIEM platform, correlates events, and alerts you before issues become incidents.
Features
- Real-time security event collection and forwarding to Vulnity SIEM.
- Dashboard widgets that highlight critical findings and remediation steps.
- Scheduled security scans for core files, plugins, and themes.
- Centralized logging compatible with major SOC workflows.
Integration Requirements
To receive alerts, configure an API token and endpoint URL provided by your Vulnity SIEM account. Detailed configuration instructions are displayed after activating the plugin under Vulnity > Settings.
External Services
This plugin connects to Vulnity’s external API hosted on Supabase Edge Functions (domain: euxnoekqasvzwfcbybkg.supabase.co, base URL https://euxnoekqasvzwfcbybkg.supabase.co/functions/v1) to power SIEM alerts, inventory sync, and mitigation updates.
- What the service is and what it is used for:
- Vulnity SIEM API for pairing/unpairing, heartbeat checks, sending alerts, testing connectivity, syncing inventory, and receiving mitigation policies.
- Endpoints used:
/pair-plugin,/unpair-plugin(pairing and disconnecting the site)./heartbeat(periodic health check)./connection-test(manual connection test)./scan-site-info(inventory sync)./generic-alert,/brute-force-alert,/file-security-alert,/manage-user,/user-management-alert,/permission-change-alert,/file-editor-alert,/plugin-change-alert,/theme-change-alert,/core-update-alert,/suspicious-query-alert,/scanner-detected-alert(security alerts)./mitigation-config,/mitigation-update(mitigation policy sync and block/unblock updates).
- What data is sent and when:
- Pairing/unpairing: site ID, pair code, plugin/WordPress/PHP versions, and timestamp when pairing or disconnecting occurs.
- Heartbeat: site ID, URLs, site metadata (name, language, timezone, theme), and runtime info (plugin/WordPress/PHP versions, latency) on a scheduled interval.
- Alerts: site ID, alert type/severity, timestamps, and event details (such as IP address, user/action metadata, or file change context) whenever a security event is detected.
- Inventory sync: site inventory details (installed plugins/themes/core metadata) when inventory sync runs.
- Mitigation: site ID, block/unblock actions, IP address, reason, duration, and rule metadata when mitigation rules are synced or enforcement actions occur.
- Why the data is sent:
- To associate the site with your Vulnity account, deliver security alerts to the SIEM, validate connectivity, synchronize inventory and mitigation policies, and keep firewall enforcement consistent.
- Policies: See the Vulnity Terms of Service and Privacy Policy for details on how data is handled.
License
This plugin is licensed under the GNU General Public License v2.0 or later. You are free to redistribute and/or modify it under the terms of the GPL as published by the Free Software Foundation. The complete license text is included in the bundled license.txt file and is also available online at https://www.gnu.org/licenses/gpl-2.0.html.
Obrázky
Inštalácia
- Upload the plugin files to the
/wp-content/plugins/vulnitydirectory or install from the WordPress plugin repository. - Activate the plugin through the Plugins screen in WordPress.
- Navigate to Vulnity > Settings, enter your Vulnity SIEM credentials, and save.
- (Optional) Enable scheduled scans on the Monitoring tab to receive weekly reports.
Časté otázky
-
Do I need a Vulnity SIEM subscription?
-
Yes. The plugin requires an active Vulnity SIEM account to collect and analyze events.
-
Will the plugin slow down my site?
-
No. Event collection runs asynchronously and offloads processing to the Vulnity cloud platform.
-
Can I disable certain alerts?
-
Absolutely. Use the Alert Policies section within the plugin settings to mute or reclassify events.
Recenzie
Pre tento plugin nie sú žiadne recenzie.
Prispievatelia a vývojári
“Vulnity Security” je softvér s otvoreným zdrojovým kódom. Do tohto pluginu prispeli nasledujúci ľudia.
PrispievateliaPreložiť „Vulnity Security“ do vašho jazyka.
Máte záujem o vývoj?
Prehľadávajte zdrojový kód, preskúmajte SVN repozitár, alebo sa prihláste na odber vývojárskeho logu cez RSS.
Zoznam zmien
1.2.3
- Fixed firewall bootstrap blocking wp-login.php, wp-cron.php, admin-ajax.php, and xmlrpc.php for blocked IPs — admins can now recover access.
- Fixed firewall bootstrap returning HTML instead of JSON for REST API requests from blocked IPs.
- Fixed uninstall leaving broken .htaccess when file is read-only — now creates safe stub to prevent HTTP 500.
- Fixed early IP blocking (plugins_loaded:0) intercepting AJAX and REST requests, breaking admin panel functionality.
- Reduced SIEM alert timeout from 10s to 3s to prevent page hangs during attacks.
- Reduced inventory sync timeout from 30s to 8s to prevent random slow page loads via pseudo-cron.
- Improved file detection in Protect Common Paths — now handles query strings, trailing slashes, and dotted directory names correctly.
- Added PHP execution blocking rule for uploads directory in generated Nginx configuration snippet.
- Expanded REST API public route whitelist: added WooCommerce v3, UpdraftPlus, BackWPup, Elementor, Forminator, FluentForms, SureCart, MailPoet, and block editor endpoints.
- Added
Options -Indexesto Protect Common Paths .htaccess rules as defense-in-depth measure. - Updated Stable tag from 1.2.2 to 1.2.3.
1.2.2
- Fixed anti-collapse dedup system blocking subsequent auto-update state toggle events due to identical hash.
- Fixed wrong authentication headers for
/real-time-alertsendpoint (now uses HMAC-SHA256 signature instead of token). - Fixed missing
remediationfield in auto-update state events sent to the SIEM. - Fixed
version_oldnot captured in auto-update events; now recorded viaupgrader_pre_installhook before files are replaced. - Fixed auto-update trigger running on disable; updates now only fire for newly enabled component types.
- Fixed auto-update event detection using
instanceof WP_Automatic_Updaterinstead ofwp_doing_cron()for broader compatibility. - Fixed single-file plugin slug resolving to
.(e.g. hello-dolly) in update event payloads. - Added
triggered_byfield to update events:siem_manual,siem_auto_update, orwp_auto_updater. - Auto-update toggles in the admin panel are now read-only; changes must be made from the SIEM.
- Replaced
parse_url()withwp_parse_url()for WordPress coding standards compliance.
1.2.1
- Plugin Check compatibility improvements for filesystem and nonce-related warnings.
- Runtime validation improvements for scanner detection, file editor monitoring, and firewall state serialization.
1.2.0
- Fixed login URL rename validation against existing pages/posts and reserved WordPress routes.
- Fixed uninstall cron cleanup to use
wp_unschedule_hook()for complete removal. - Fixed heartbeat, mitigation sync, and alert buffer crons not cancelled on plugin disconnect.
1.1.9
- Send whitelist IPs (user public IP + localhost) to the SIEM during pairing so the whitelist persists after synchronization.
1.1.8
- Fixed Nginx warning notice appearing repeatedly on every admin page load; it now displays only once.
- Improved notice format: each protected path is shown on its own line for better readability.
- Added link to solution documentation for Nginx .htaccess compatibility.
1.1.7
- Fixed deactivation not clearing all cron jobs (4 missing hooks, plus events re-scheduled by late-firing alert hooks).
- Added
final_deactivation_cleanupat priority 9999 to ensure complete cron and .htaccess cleanup after all hooks fire. - Replaced
wp_clear_scheduled_hookwithwp_unschedule_hookto clear single events with arguments. - Added native PHP fallback for .htaccess marker removal when WP_Filesystem is unavailable.
- Fixed Plugin Check error: replaced direct
is_writable()withvulnity_path_is_writable()andWP_Filesystem_Direct.
1.1.5
- Fix uninstall multisite cleanup query when
sitemetatable is not available to prevent SQL warnings in debug.log.
1.1.4
- Ensure uninstall removes Vulnity firewall/log folders recursively so no plugin-owned folders are left behind.
1.1.3
- Ensure uninstall removes Vulnity firewall/log folders even when permissions are restrictive by attempting safe chmod before cleanup.
1.1.2
- Added a dedicated Vulnity log with line-based rotation and safe fallbacks when uploads are not writable.
- Added admin warning when firewall storage cannot be written, with clear remediation guidance.
- Expanded uninstall cleanup to remove Vulnity log files and firewall artifacts across fallback paths.
1.1.1
- Fixed deactivation cleanup so Vulnity hardening marker blocks are removed fully from
.htaccesswithout modifying user-defined rules. - Improved deactivation safety in shared hosting environments with conservative, marker-only rollback behavior.
1.1.0
- Improved admin UI consistency across Dashboard, Synchronization, Mitigation, Hardening, and Setup screens.
- Hardened plugin lifecycle behavior for shared hosting compatibility and safer deactivation/uninstall flows.
- Added conservative server integration safeguards to reduce side effects in Apache/Nginx environments.
1.0.5
- Version bump to 1.0.5.
1.0.4
- Version bump to 1.0.4.
1.0.3
- Standardized admin asset enqueues and AJAX URL localization for compliant loading.
- Hardened nonce and capability checks across alerts and admin handlers.
- Improved path resolution using WordPress APIs for non-default installs.
- Documented external Supabase services used for alerts and mitigation updates.
1.0.2
- Initial release.






