THREAT INTELLIGENCE FEED

CURRENT VULNERABILITY LOG

Active monitoring of the WordPress landscape. These threats are currently being mitigated across the GuardWasp network.

CRITICAL

Remote Code Execution (RCE) via File Upload

Exploit targeting unpatched image optimization plugins. Allows attackers to upload "web shells" and take full server control.

STATUS: MITIGATED FOR ALL VIGILANCE CLIENTS
HIGH

SEO Spam Injection (Japanese Keyword Hack)

Automated scripts injecting thousands of phantom pages into the WordPress database to hijack search engine rankings.

STATUS: ACTIVE REMOVAL IN PROGRESS
MEDIUM

WP-Admin Brute Force Surge

Massive botnet activity targeting the /wp-login.php endpoint. High-frequency credential stuffing attacks detected globally.

STATUS: PERIMETER HARDENING ACTIVE
CRITICAL

Database Credential Scraping

Vulnerability in outdated backup plugins exposing wp-config.php files to public-facing directories.

STATUS: EMERGENCY PATCHING DEPLOYED