Last month in September 2025, the Wordfence Bug Bounty Program received 374 vulnerability submissions from our growing community of security researchers working to improve the overall security posture of the WordPress ecosystem. These submissions are reviewed, triaged, and processed by the Wordfence Threat Intelligence team, with validated vulnerabilities responsibly disclosed to vendors, often through the Wordfence Vulnerability Management Portal – a free service for all WordPress vendors, and protected through the Wordfence Firewall where appropriate.
Our mission with the Wordfence Bug Bounty Program is to engage the broader security community in identifying and responsibly disclosing vulnerabilities in WordPress plugins and themes, so we can work with vendors to get them patched before attackers discover them. This collaborative effort enables Wordfence to accelerate patch adoption, provide early protection to millions of websites, and ensure that high-quality vulnerability intelligence reaches the WordPress ecosystem as efficiently as possible. It also ensures that we are able to remediate vulnerabilities before attackers are able to discover them and start exploiting them. That is why we reward researchers for valid submissions, and why we remain committed to processing every report with transparency, accuracy, and urgency.
Join the Wordfence Bug Bounty Program
Help secure the WordPress ecosystem while earning rewards for your security research.
We’re actively seeking skilled researchers to identify vulnerabilities in WordPress plugins and themes, with prompt payments and transparent processes.
As the most comprehensive and highest-quality WordPress vulnerability program, the Wordfence Bug Bounty Program plays a critical role in helping site owners, developers, and hosting providers stay ahead of emerging threats at all stages of the open source lifecycle.
In this report, we highlight key metrics of the Bug Bounty Program from September 2025, recognize the researchers contributing to WordPress security, and provide insight into the vulnerabilities uncovered and addressed.
If you’re interested in joining the program or learning more about how we responsibly manage disclosures and protect WordPress users, visit the Bug Bounty Program page.
WordPress Software Vendors – Sign Up For Free Centralized Management of all Vulnerabilities in Your Software
Wordfence provides a completely free vulnerability management portal for WordPress Software vendors to easily track and manage all vulnerabilities submitted to the Wordfence Bug Bounty Program, and added to the Wordfence Intelligence Vulnerability Database.
This portal streamlines and enhances the repsonsible disclosure process so you can secure your customers faster.
Program Submission Highlights – September 2025
The Wordfence Bug Bounty Program is designed for momentum: rapid triage of critical issues, clear feedback, and fast, fair rewards. Each submission moves through our standardized workflow of validation, vendor coordination, patch verification, and firewall coverage where applicable, so research translates into real-world protection quickly.
Real-Time Protection Impact
Every vulnerability disclosed through this program is a threat you don’t have to face blindly. Our researchers uncover and report vulnerabilities before they can be exploited, and Wordfence Premium, Care and Response users get protection in real-time through our firewall. Free users are protected in 30 days.
Behind the numbers is meaningful impact for site owners. The issues surfaced here inform new firewall rules, strengthen our detection logic, and help vendors ship safer releases. If you’re new to bounty hunting, this is a great place to start: we publish scope clearly, pay promptly, and credit the work that keeps WordPress secure.

Total Submissions

Active Researchers

High Threat

Common & Dangerous

WAF Rules Released
Vulnerability Focus Areas
High Threat Vulnerabilities: Issues that could result in full site compromise, such as Arbitrary File Uploads or Remote Code Execution. Must be exploitable by unauthenticated or low-level authenticated attackers with software having 25+ active installations.
Common & Dangerous: Stored Cross-Site Scripting and SQL Injection vulnerabilities exploitable by unauthenticated or low-level authenticated attackers. Software must have 500+ active installations.
Bounty Insights – September 2025
Our research powers real investment back into the community. This section totals bounties and bonuses paid for the month and showcases standout findings. Our philosophy is simple: reward high-quality, responsibly disclosed research that measurably reduces risk for WordPress users.

Total Bounties Awarded

Average Bounty Per Submission

Highest Single Bounty
Top 5 Bounties Awarded
Vulnerability | Bounty | Install Count |
---|---|---|
Authenticated (Contributor+) Stored Cross-Site Scripting (In Disclosure) – Multiple Parameters | $1,152.00 | 200,000 |
WP Statistics <= 14.5.4 – Unauthenticated Stored Cross-Site Scripting via User-Agent Header | $960.00 | 600,000 |
Slider Revolution <= 6.7.37 – Missing Authorization to Authenticated (Contributor+) Arbitrary File Read | $908.00 | 5,000,000 |
Motors – Car Dealership & Classified Listings Plugin <= 1.4.89 – Authenticated (Subscriber+) Arbitrary File Deletion | $540.00 | 10,000 |
Unauthenticated Arbitrary File Upload (In Disclosure) | $455.00 | 9,000 |
Want to earn more? Read the scope carefully, target high-threat classes, and include clear reproduction steps with proof of impact. We pay promptly on validated issues, and bonus multipliers may apply during limited-time promotions and challenges.
WordPress Software Vulnerability Submission Insights – September 2025
This section breaks down how reports map to our program outcomes. What’s in scope, what isn’t, and where the highest security impact typically sits. We highlight the most common in-scope vulnerability classes and the categories that yielded the largest rewards so researchers can focus their efforts where they matter most.
Authentication level and exploit preconditions drive risk and reward through our program. Unauthenticated and low-privilege paths tend to have outsized impact because they scale to more real-world compromise. Use these insights to prioritize your testing strategy and maximize both security value and bounty potential.
Total Number of Vulnerabilities Considered In Scope, Out of Scope, Rejected, or Duplicate
In Scope | Out of Scope | Rejected | Duplicate |
---|---|---|---|
96 | 207 | 40 | 31 |
Top 10 Most Commonly Submitted In-Scope Vulnerability Types
The most frequently submitted vulnerability types highlight current testing focus areas across the researcher community. These patterns often reflect both ease of discovery and prevalence in the WordPress ecosystem.
Vulnerability Type | Total Submissions | Total Rewards | Avg. Reward |
---|---|---|---|
CWE 89: Improper Neutralization of Special Elements used in an SQL Command (‘SQL Injection’) | 17 | $1,211.00 | $71.24 |
CWE 79: Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’) | 15 | $2,722.00 | $181.47 |
CWE 862: Missing Authorization | 13 | $1,247.00 | $95.92 |
CWE 80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) | 6 | $1,735.00 | $289.17 |
CWE 285: Improper Authorization | 5 | $595.00 | $119.00 |
CWE 434: Unrestricted Upload of File with Dangerous Type | 5 | $871.00 | $174.20 |
CWE 918: Server-Side Request Forgery (SSRF) | 5 | $226.00 | $45.20 |
CWE 200: Exposure of Sensitive Information to an Unauthorized Actor | 4 | $189.00 | $47.25 |
CWE 269: Improper Privilege Management | 4 | $514.00 | $128.50 |
CWE 352: Cross-Site Request Forgery (CSRF) | 4 | $366.00 | $91.50 |
Top 10 Highest Rewarded In-Scope Vulnerability Types
While some vulnerabilities appear frequently, others command premium rewards. This breakdown shows which vulnerability classes generated the highest total payouts across all submissions in those categories, indicating both severity and exploitability value.
Vulnerability Type | Total Rewards | Total Submissions | Avg. Reward |
---|---|---|---|
CWE 79: Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’) | $2,722.00 | 15 | $181.47 |
CWE 80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) | $1,735.00 | 6 | $289.17 |
CWE 862: Missing Authorization | $1,247.00 | 13 | $95.92 |
CWE 89: Improper Neutralization of Special Elements used in an SQL Command (‘SQL Injection’) | $1,211.00 | 17 | $71.24 |
CWE 23: Relative Path Traversal | $908.00 | 1 | $908.00 |
CWE 434: Unrestricted Upload of File with Dangerous Type | $871.00 | 5 | $174.20 |
CWE 73: External Control of File Name or Path | $807.00 | 2 | $403.50 |
CWE 285: Improper Authorization | $595.00 | 5 | $119.00 |
CWE 639: Authorization Bypass Through User-Controlled Key | $523.00 | 4 | $130.75 |
CWE 269: Improper Privilege Management | $514.00 | 4 | $128.50 |
In-Scope Vulnerability Distribution by Authentication Level
Authentication requirements directly impact real-world exploitability. Unauthenticated and subscriber-level vulnerabilities typically pose greater risk, reflected in both our prioritization and reward structure.
Authentication Level | Total Vulnerabilities | Avg. Reward |
---|---|---|
Unauthenticated | 44 | $170.69 |
Contributor | 31 | $125.13 |
Subscriber | 8 | $115.43 |
Unauthenticated – UI Required | 7 | $101.29 |
Author | 6 | $15.80 |
Vulnerability Submission Install Count Spread
Install counts help us gauge blast radius. Higher install bases can move a finding into higher priority and often correlate with stronger payouts, while smaller-but-critical ecosystems still qualify when the exploitability and impact warrant it.
Install Range | Total Vulnerabilities | Average CVSS | Avg. Reward |
---|---|---|---|
100,000–999,999 | 30 | 5.44 | $159.23 |
1,000–49,999 | 27 | 7.38 | $188.88 |
0–499 | 15 | 8.17 | $17.40 |
50,000–99,999 | 12 | 5.32 | $63.91 |
1,000,000–4,999,999 | 5 | 6.40 | $171.20 |
500–999 | 5 | 8.54 | $57.80 |
5,000,000+ | 2 | 6.45 | $612.50 |
Top WordPress Security Researchers – September 2025
Security is a team sport, and this leaderboard celebrates the people raising the bar. We recognize contributors by valid in-scope submissions, overall earnings, and average severity to highlight different paths to excellence.
Top 5 Researchers based on Volume of In-Scope Submissions
Volume leaders demonstrate consistent vulnerability discovery across diverse targets. These researchers excel at systematic testing and maintaining high validation rates.
Researcher | Total Submissions | Avg. Reward |
---|---|---|
Muhammad Yudha – DJ | 13 | $167.15 |
Rafshanzani Suhada | 12 | $160.00 |
Dmitrii Ignatyev | 9 | $164.67 |
Lucas Montes (Nirox) | 8 | $39.38 |
abrahack | 5 | $121.80 |
Top 5 Researchers Based on Average CVSS of In-Scope Submissions
Quality over quantity defines these researchers who consistently identify high-severity vulnerabilities. Their average CVSS scores reflect expertise in finding critical security gaps.
Researcher | Average CVSS | Total Submissions | Avg. Reward |
---|---|---|---|
Foxyyy | 9.80 | 1 | $358.00 |
Talal Nasraddeen* | 9.03 | 3 | $326.67 |
kr0d | 9.00 | 5 | $92.20 |
theviper17y | 8.80 | 4 | $21.00 |
ifoundbug | 8.50 | 2 | $41.50 |
*Researchers with an asterisk do not have active public profiles yet since their vulnerabilities have not been published.
Top 5 Researchers Based On Total Bounties Earned
Combining volume with severity, these top earners maximized their impact and rewards through strategic vulnerability research and comprehensive reporting.
Researcher | Total Earned | Total Submissions | Avg. Reward |
---|---|---|---|
Muhammad Yudha – DJ | $2,173.00 | 13 | $167.15 |
Rafshanzani Suhada | $1,920.00 | 12 | $160.00 |
Dmitrii Ignatyev | $1,482.00 | 9 | $164.67 |
Talal Nasraddeen* | $980.00 | 3 | $326.67 |
stealthcopter | $914.00 | 2 | $457.00 |
*Researchers with an asterisk do not have active public profiles yet since their vulnerabilities have not been published.
Researchers Promoted to the Next Tier
Congratulations to the following researchers who have unlocked the next tier! Tier promotions reflect sustained performance, precision, and professionalism in disclosure. Advancing unlocks higher caps, faster reviews, and more visibility. If you’re climbing the ranks, focus on high risk vulnerabilities, keep reports crisp, attach working PoCs, and include mitigation notes vendors can ship quickly.
Elite Researcher Tier (1337)

Resourceful Researcher Tier

Current WordPress Bug Bounty Program Promotions
As part of our Bug Bounty Program, we regularly launch special promotions that boost bounty rewards and expand research scope. These initiatives are designed to reinforce our mission: delivering the highest quality vulnerability intelligence while encouraging researchers to focus on the discoveries that have the greatest positive impact on the WordPress ecosystem.
At the same time, we also look for promotions that give researchers opportunities to sharpen their skills, take on new challenges, and continue growing into the best of the best in WordPress security research. We often supplement these with educational material for researchers to learn and apply their skills during these promotions.
Below, you’ll find details on all currently active challenges—including timelines and a quick overview of each promotion.

Now through November 10, 2025, earn 2X bounty rewards for all in-scope submissions in software with at least 5,000 active installs and fewer than 5 million active installs. Bounties up to $31,200 per vulnerability. Submit bold. Earn big!
The goal with this promotion is to drive higher impact research so we can protect the most amount of sites with the research we are attracting.

Refine your LFI hunting skills with an expanded scope. Now through November 24, 2025, all LFI vulnerabilities in software with at least 25 active installs are considered in-scope for all researchers, regardless of researcher tier, AND earn a 30% bonus on all Local File Inclusion vulnerability submissions not already increased by another promotion.
The goal with this promotion is to provide an educational opportunity for new hunters learning how to find LFI vulnerabilities, by giving them the widest scope and highest bounties to learn. Get started with your LFI journey with this detailed beginners guide here.
New to promotions? Start by confirming the software and version range are in scope, validate exploitability on a clean test environment, and submit with clear steps, affected code paths, and impact. Promotions are perfect opportunities for both new and seasoned researchers to maximize earnings while driving faster patch adoption. And remember, you can always check what’s in-scope and out-of-scope by using the Wordfence bounty estimator.
Critical WordPress Software Vulnerability Highlights – September 2025
These case studies spotlight high-impact vulnerabilities uncovered through the program, why they matter, and how quickly protection rolled out. We share technical detail to help researchers learn, vendors harden code, and users understand why timely updates aren’t optional.
If you maintain a site, update to the patched versions listed and ensure Wordfence is active so you benefit from new firewall coverage as it ships. If you’re a researcher, use these write-ups to inform your hunt: patterns repeat, and past root causes often reappear in adjacent code.
600,000 WordPress Sites Affected by PHP Object Injection Vulnerability in Fluent Forms WordPress Plugin
Fluent Forms – Customizable Contact Forms, Survey, Quiz, & Conversational Form Builder 5.1.16 – 6.1.1 – Authenticated (Subscriber+) PHP Object Injection To Arbitrary File Read
Webbernaut
$1,729.00
The Fluent Forms – Customizable Contact Forms, Survey, Quiz, & Conversational Form Builder plugin for WordPress is vulnerable to PHP Object Injection in versions 5.1.16 to 6.1.1 via deserialization of untrusted input in the parseUserProperties function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to inject a PHP Object. The additional presence of a POP chain allows attackers to read arbitrary files. If allow_url_include is enabled on the server, remote code execution is possible. While the vendor patched this issue in version 6.1.0, the patch caused a fatal error in the vulnerable code, due to a missing class import, so we consider 6.1.2 to be the most complete and best patched version.
Attackers Actively Exploiting Critical Vulnerability in Case Theme User Plugin
Case Theme User <= 1.0.3 – Authentication Bypass via Social Login
Foxyyy
$715.00
The Case Theme User plugin for WordPress is vulnerable to Authentication Bypass in all versions up to, and including, 1.0.3. This is due to the plugin not properly logging in a user with the data that was previously verified through the facebook_ajax_login_callback() function. This makes it possible for unauthenticated attackers to log in as administrative users, as long as they have an existing account on the site which can easily be created by default through the temp user functionality, and access to the administrative user’s email.
Conclusion
WordPress thrives when researchers, vendors, hosts, and site owners pull in the same direction. By funding high-quality research, coordinating responsible disclosure, and shipping firewall rules at scale, Wordfence turns findings into protection for millions of sites.
If you’re a researcher, join the program and submit your next report. If you’re a site owner, update early and often, and run Wordfence to stay ahead of emerging threats. If you’re a vendor, sign up for the vulnerability management portal to receive real-time notifications when new vulnerabilities are reported in your software. Together, we make the WordPress ecosystem safer.
The post Wordfence Bug Bounty Program Monthly Report – September 2025 appeared first on Wordfence.