typisttech/wpsecadv
GitHub: typisttech/wpsecadv
将 Wordfence 漏洞数据转换为 Composer 可用格式的安全建议仓库,支持原生的 composer audit 审计和漏洞包安装拦截。
Stars: 5 | Forks: 0
# WP Sec Adv
[](https://github.com/typisttech/wpsecadv/actions/workflows/test.yml)
[](https://codecov.io/gh/typisttech/wpsecadv)
[](https://github.com/typisttech/wpsecadv/blob/master/LICENSE)
[](https://x.com/tangrufus)
[](https://bsky.app/profile/tangrufus.com)
[](https://github.com/sponsors/tangrufus)
[](https://typist.tech/contact/)
## 快速入门
```
composer repo --append add wpsecadv composer https://repo-wpsecadv.typist.tech
composer audit
```
它生成的审计报告如下所示:
```
Found 2 security vulnerability advisories affecting 1 package:
+-------------------+--------------------------------------------------------------+
| Package | roots/wordpress-no-content |
| Severity | medium |
| Advisory ID | WPSECADV/WF/112ed4f2-fe91-4d83-a3f7-eaf889870af4/wordpress |
| CVE | CVE-2022-3590 |
// ...
```
Composer repository for WordPress security advisories.
Built with ♥ by Typist Tech
Command "repo" is not defined.
`composer repo` 子命令是从 Composer v2.9.0 开始添加的。 如果您使用的是旧版本的 Composer,请手动将其**追加**到您的 `composer.json` 中: ``` "repositories": [ { "name": "wp-packages", "type": "composer", "url": "https://repo.wp-packages.org" - } + }, + { + "name": "wpsecadv", + "type": "composer", + "url": "https://repo-wpsecadv.typist.tech" + } ], ```完整的控制台输出
``` $ composer audit Found 3 security vulnerability advisories affecting 2 packages: +-------------------+----------------------------------------------------------------------------------+ | Package | roots/wordpress-no-content | | Severity | medium | | Advisory ID | WPSECADV/WF/112ed4f2-fe91-4d83-a3f7-eaf889870af4/wordpress | | CVE | CVE-2022-3590 | | Title | WordPress Core - All known versions - Unauthenticated Blind Server Side Request | | | Forgery | | | ### Copyright 1999-2026 The MITRE Corporation | | | CVE Usage: MITRE hereby grants you a perpetual, worldwide, non-exclusive, | | | no-charge, royalty-free, irrevocable copyright license to reproduce, prepare | | | derivative works of, publicly display, publicly perform, sublicense, and | | | distribute Common Vulnerabilities and Exposures (CVE®). Any copy you make for | | | such purposes is authorized provided that you reproduce MITRE's copyright | | | designation and this license in any such copy. | | | https://www.cve.org/Legal/TermsOfUse | | | ### Copyright 2012-2026 Defiant Inc. | | | Defiant hereby grants you a perpetual, worldwide, non-exclusive, no-charge, | | | royalty-free, irrevocable copyright license to reproduce, prepare derivative | | | works of, publicly display, publicly perform, sublicense, and distribute this | | | software vulnerability information. Any copy of the software vulnerability | | | information you make for such purposes is authorized provided that you include a | | | hyperlink to this vulnerability record and reproduce Defiant's copyright | | | designation and this license in any such copy. | | | https://www.wordfence.com/wordfence-intelligence-terms-and-conditions/ | | URL | https://www.wordfence.com/threat-intel/vulnerabilities/id/112ed4f2-fe91-4d83-a3f | | | 7-eaf889870af4?source=api-prod | | Affected versions | * | | Reported at | 2022-09-06T00:00:00+00:00 | +-------------------+----------------------------------------------------------------------------------+ +-------------------+----------------------------------------------------------------------------------+ | Package | roots/wordpress-no-content | | Severity | medium | | Advisory ID | WPSECADV/WF/9fda5e15-fdf9-4b67-93d3-2dbfa94aefe9/wordpress | | CVE | CVE-2017-14990 | | Title | WordPress Core - All Known Versions - Cleartext Storage of | | | wp_signups.activation_key | | | ### Copyright 1999-2026 The MITRE Corporation | | | CVE Usage: MITRE hereby grants you a perpetual, worldwide, non-exclusive, | | | no-charge, royalty-free, irrevocable copyright license to reproduce, prepare | | | derivative works of, publicly display, publicly perform, sublicense, and | | | distribute Common Vulnerabilities and Exposures (CVE®). Any copy you make for | | | such purposes is authorized provided that you reproduce MITRE's copyright | | | designation and this license in any such copy. | | | https://www.cve.org/Legal/TermsOfUse | | | ### Copyright 2012-2026 Defiant Inc. | | | Defiant hereby grants you a perpetual, worldwide, non-exclusive, no-charge, | | | royalty-free, irrevocable copyright license to reproduce, prepare derivative | | | works of, publicly display, publicly perform, sublicense, and distribute this | | | software vulnerability information. Any copy of the software vulnerability | | | information you make for such purposes is authorized provided that you include a | | | hyperlink to this vulnerability record and reproduce Defiant's copyright | | | designation and this license in any such copy. | | | https://www.wordfence.com/wordfence-intelligence-terms-and-conditions/ | | URL | https://www.wordfence.com/threat-intel/vulnerabilities/id/9fda5e15-fdf9-4b67-93d | | | 3-2dbfa94aefe9?source=api-prod | | Affected versions | * | | Reported at | 2017-10-10T00:00:00+00:00 | +-------------------+----------------------------------------------------------------------------------+ +-------------------+----------------------------------------------------------------------------------+ | Package | wp-theme/twentyfifteen | | Severity | medium | | Advisory ID | WPSECADV/WF/57666105-81e4-4ef4-8889-9ce9995d2629/twentyfifteen | | CVE | CVE-2015-3429 | | Title | Twenty Fifteen Theme <= 1.1 & WordPress Core < 4.2.2 - Cross-Site Scripting via | | | example.html | | | ### Copyright 1999-2026 The MITRE Corporation | | | CVE Usage: MITRE hereby grants you a perpetual, worldwide, non-exclusive, | | | no-charge, royalty-free, irrevocable copyright license to reproduce, prepare | | | derivative works of, publicly display, publicly perform, sublicense, and | | | distribute Common Vulnerabilities and Exposures (CVE®). Any copy you make for | | | such purposes is authorized provided that you reproduce MITRE's copyright | | | designation and this license in any such copy. | | | https://www.cve.org/Legal/TermsOfUse | | | ### Copyright 2012-2026 Defiant Inc. | | | Defiant hereby grants you a perpetual, worldwide, non-exclusive, no-charge, | | | royalty-free, irrevocable copyright license to reproduce, prepare derivative | | | works of, publicly display, publicly perform, sublicense, and distribute this | | | software vulnerability information. Any copy of the software vulnerability | | | information you make for such purposes is authorized provided that you include a | | | hyperlink to this vulnerability record and reproduce Defiant's copyright | | | designation and this license in any such copy. | | | https://www.wordfence.com/wordfence-intelligence-terms-and-conditions/ | | URL | https://www.wordfence.com/threat-intel/vulnerabilities/id/57666105-81e4-4ef4-888 | | | 9-9ce9995d2629?source=api-prod | | Affected versions | <=1.1 | | Reported at | 2015-04-08T00:00:00+00:00 | +-------------------+----------------------------------------------------------------------------------+ ```完整的控制台输出
``` $ composer require wp-theme/twentyfifteen ./composer.json has been updated Running composer update wp-theme/twentyfifteen Loading composer repositories with package information Updating dependencies Lock file operations: 0 installs, 1 update, 0 removals - Upgrading wp-theme/twentyfifteen (1.1 => 4.1) Writing lock file Installing dependencies from lock file (including require-dev) Package operations: 0 installs, 1 update, 0 removals - Upgrading wp-theme/twentyfifteen (1.1 => 4.1): Extracting archive Generating optimized autoload files Found 2 security vulnerability advisories affecting 1 package. Run "composer audit" for a full list of advisories. Using version ^4.1 for wp-theme/twentyfifteen ```完整的控制台输出
``` $ composer require wp-plugin/woocommerce:10.5.0 ./composer.json has been updated Running composer update wp-plugin/woocommerce Loading composer repositories with package information Updating dependencies Your requirements could not be resolved to an installable set of packages. Problem 1 - Root composer.json requires wp-plugin/woocommerce 10.5.0 (exact version match: 10.5.0 or 10.5.0.0), found wp-plugin/woocommerce[10.5.0] but these were not loaded, because they are affected by security advisories ("WPSECADV/WF/df7eca9b-e353-49e7-8706-89c1787637e9/woocommerce"). Go to https://packagist.org/security-advisories/ to find advisory details. To ignore the advisories, add them to the audit "ignore" config. To turn the feature off entirely, you can set "block-insecure" to false in your "audit" config. Installation failed, reverting ./composer.json and ./composer.lock to their original content. ```完整的控制台输出
``` $ composer require wp-plugin/woocommerce:10.5.0 --no-security-blocking ./composer.json has been updated Running composer update wp-plugin/woocommerce Loading composer repositories with package information Updating dependencies Lock file operations: 1 install, 0 updates, 0 removals - Locking wp-plugin/woocommerce (10.5.0) Writing lock file Installing dependencies from lock file (including require-dev) Package operations: 1 install, 0 updates, 0 removals - Installing wp-plugin/woocommerce (10.5.0): Extracting archive Generating optimized autoload files Found 2 ignored security vulnerability advisories affecting 1 package. Found 1 security vulnerability advisory affecting 1 package. Run "composer audit" for a full list of advisories. ```完整的控制台输出
``` $ composer audit Found 2 ignored security vulnerability advisories affecting 1 package: +-------------------+----------------------------------------------------------------------------------+ | Package | roots/wordpress-no-content | | Severity | medium | | Advisory ID | WPSECADV/WF/112ed4f2-fe91-4d83-a3f7-eaf889870af4/wordpress | | CVE | CVE-2022-3590 | | Title | WordPress Core - All known versions - Unauthenticated Blind Server Side Request | | | Forgery | | | ### Copyright 1999-2026 The MITRE Corporation | | | CVE Usage: MITRE hereby grants you a perpetual, worldwide, non-exclusive, | | | no-charge, royalty-free, irrevocable copyright license to reproduce, prepare | | | derivative works of, publicly display, publicly perform, sublicense, and | | | distribute Common Vulnerabilities and Exposures (CVE®). Any copy you make for | | | such purposes is authorized provided that you reproduce MITRE's copyright | | | designation and this license in any such copy. | | | https://www.cve.org/Legal/TermsOfUse | | | ### Copyright 2012-2026 Defiant Inc. | | | Defiant hereby grants you a perpetual, worldwide, non-exclusive, no-charge, | | | royalty-free, irrevocable copyright license to reproduce, prepare derivative | | | works of, publicly display, publicly perform, sublicense, and distribute this | | | software vulnerability information. Any copy of the software vulnerability | | | information you make for such purposes is authorized provided that you include a | | | hyperlink to this vulnerability record and reproduce Defiant's copyright | | | designation and this license in any such copy. | | | https://www.wordfence.com/wordfence-intelligence-terms-and-conditions/ | | URL | https://www.wordfence.com/threat-intel/vulnerabilities/id/112ed4f2-fe91-4d83-a3f | | | 7-eaf889870af4?source=api-prod | | Affected versions | * | | Reported at | 2022-09-06T00:00:00+00:00 | | Ignore reason | None specified | +-------------------+----------------------------------------------------------------------------------+ +-------------------+----------------------------------------------------------------------------------+ | Package | roots/wordpress-no-content | | Severity | medium | | Advisory ID | WPSECADV/WF/9fda5e15-fdf9-4b67-93d3-2dbfa94aefe9/wordpress | | CVE | CVE-2017-14990 | | Title | WordPress Core - All Known Versions - Cleartext Storage of | | | wp_signups.activation_key | | | ### Copyright 1999-2026 The MITRE Corporation | | | CVE Usage: MITRE hereby grants you a perpetual, worldwide, non-exclusive, | | | no-charge, royalty-free, irrevocable copyright license to reproduce, prepare | | | derivative works of, publicly display, publicly perform, sublicense, and | | | distribute Common Vulnerabilities and Exposures (CVE®). Any copy you make for | | | such purposes is authorized provided that you reproduce MITRE's copyright | | | designation and this license in any such copy. | | | https://www.cve.org/Legal/TermsOfUse | | | ### Copyright 2012-2026 Defiant Inc. | | | Defiant hereby grants you a perpetual, worldwide, non-exclusive, no-charge, | | | royalty-free, irrevocable copyright license to reproduce, prepare derivative | | | works of, publicly display, publicly perform, sublicense, and distribute this | | | software vulnerability information. Any copy of the software vulnerability | | | information you make for such purposes is authorized provided that you include a | | | hyperlink to this vulnerability record and reproduce Defiant's copyright | | | designation and this license in any such copy. | | | https://www.wordfence.com/wordfence-intelligence-terms-and-conditions/ | | URL | https://www.wordfence.com/threat-intel/vulnerabilities/id/9fda5e15-fdf9-4b67-93d | | | 3-2dbfa94aefe9?source=api-prod | | Affected versions | * | | Reported at | 2017-10-10T00:00:00+00:00 | | Ignore reason | None specified | +-------------------+----------------------------------------------------------------------------------+ Found 1 security vulnerability advisory affecting 1 package: +-------------------+----------------------------------------------------------------------------------+ | Package | wp-plugin/woocommerce | | Severity | medium | | Advisory ID | WPSECADV/WF/df7eca9b-e353-49e7-8706-89c1787637e9/woocommerce | | CVE | CVE-2026-3589 | | Title | WooCommerce < 10.5.3 - Cross-Site Request Forgery | | | ### Copyright 1999-2026 The MITRE Corporation | | | CVE Usage: MITRE hereby grants you a perpetual, worldwide, non-exclusive, | | | no-charge, royalty-free, irrevocable copyright license to reproduce, prepare | | | derivative works of, publicly display, publicly perform, sublicense, and | | | distribute Common Vulnerabilities and Exposures (CVE®). Any copy you make for | | | such purposes is authorized provided that you reproduce MITRE's copyright | | | designation and this license in any such copy. | | | https://www.cve.org/Legal/TermsOfUse | | | ### Copyright 2012-2026 Defiant Inc. | | | Defiant hereby grants you a perpetual, worldwide, non-exclusive, no-charge, | | | royalty-free, irrevocable copyright license to reproduce, prepare derivative | | | works of, publicly display, publicly perform, sublicense, and distribute this | | | software vulnerability information. Any copy of the software vulnerability | | | information you make for such purposes is authorized provided that you include a | | | hyperlink to this vulnerability record and reproduce Defiant's copyright | | | designation and this license in any such copy. | | | https://www.wordfence.com/wordfence-intelligence-terms-and-conditions/ | | URL | https://www.wordfence.com/threat-intel/vulnerabilities/id/df7eca9b-e353-49e7-870 | | | 6-89c1787637e9?source=api-prod | | Affected versions | <10.5.3 | | Reported at | 2026-03-10T00:00:00+00:00 | +-------------------+----------------------------------------------------------------------------------+ ```标签:Composer, CVE, EVTX分析, LNA, OpenVAS, PHP, Typist Tech, Web安全, WordPress, WP Sec Adv, 云安全监控, 依赖管理, 安全通告, 开发运维, 插件安全, 数字签名, 蓝队分析, 静态分析