Threat Intel
43% of all websites run WordPress — making it the #1 attack surface worldwide 1 in 25 WordPress sites is actively infected with malware right now 97% of CMS-based attacks specifically target WordPress plugins & themes 50,000+ vulnerabilities indexed · WPScan threat database 71% of hacked WordPress sites had a backdoor silently installed 4,000+ plugins carry known, unpatched security vulnerabilities Average breach goes undetected for 197 days — is your site clean? Outdated plugins are responsible for 52% of all WordPress infections SQL injection & XSS remain the top two WordPress attack vectors 60% of infections exploit a vulnerability that already had a patch available 43% of all websites run WordPress — making it the #1 attack surface worldwide 1 in 25 WordPress sites is actively infected with malware right now 97% of CMS-based attacks specifically target WordPress plugins & themes 50,000+ vulnerabilities indexed · WPScan threat database 71% of hacked WordPress sites had a backdoor silently installed 4,000+ plugins carry known, unpatched security vulnerabilities Average breach goes undetected for 197 days — is your site clean? Outdated plugins are responsible for 52% of all WordPress infections SQL injection & XSS remain the top two WordPress attack vectors 60% of infections exploit a vulnerability that already had a patch available
Scan Free →
wp-scan.org

WordPress SQL Injection Scanner

SQL injection is the most common way WordPress sites get compromised. Custom themes and plugins often pass $_GET, $_POST, or $_COOKIE values directly into database queries without sanitization. wp-scan.org scans every PHP file for these patterns: direct string concatenation into $wpdb queries, unsafe use of $wpdb->query() with user input, and missing prepare() calls where they're needed.

What wp-scan.org detects

  • Unsanitized $_GET/$_POST/$_COOKIE in $wpdb queries
  • String concatenation directly into SQL without prepare()
  • Missing or incorrect use of $wpdb->prepare()
  • Unsafe ORDER BY and LIMIT clauses from user input
  • Second-order injection patterns in stored data
  • Custom PDO/mysqli queries without parameterization

Scan your WordPress files now — free

Drop your ZIP here

or click to browse · up to 20 MB free

Want to see what a Premium report looks like?

View a real scan with line numbers, fix guides, and secure code for every finding.

View sample report →

Common questions

See exact line numbers and fix guides for every finding

Upgrade to Premium — from $9.99/mo →