Documents / Sentinel Security / Features

Vulnerability Assessment

Vulnerability Assessment

Vulnerability Assessment comprehensively checks a WordPress site's configuration and versions, detecting known security risks and providing a security score.

Why Vulnerability Assessment Matters

WordPress sites consist of three layers: core, plugins, and themes. Security vulnerabilities patched through version updates are discovered daily across all three.

  • 30–50 WordPress core vulnerabilities are reported per year
  • Dozens of popular plugin vulnerabilities are discovered monthly
  • Sites running outdated versions are targets of automated attacks
Vulnerability Assessment provides a unified view of missed major updates, dangerous settings, and unnecessary files.

Diagnostic Categories (7 Categories, 20 Items)

1. WordPress Core (3 items)

Check ItemCWE ReferenceDescription
Core VersionCWE-1104Version comparison with latest release
Database Table PrefixCWE-200Use of default wp_ prefix
Debug ModeCWE-209WP_DEBUG enabled state

2. Authentication & Login (4 items)

Check ItemCWE ReferenceDescription
Default Admin UsernameCWE-798Existence of an "admin" account
Weak Password PolicyCWE-521Password strength settings
User EnumerationCWE-200Whether Author ID enumeration is possible
Login Attempt LimitingCWE-307Whether brute-force protection is enabled

3. File System (3 items)

Check ItemCWE ReferenceDescription
File PermissionsCWE-732Permissions on wp-config.php and other files
Directory ListingCWE-548Whether directory listing is enabled
Unnecessary FilesCWE-538Presence of readme.html, license.txt, etc.

4. Database (2 items)

Check ItemCWE ReferenceDescription
Database Connection EncryptionCWE-319MySQL SSL/TLS connection settings
Database User PrivilegesCWE-250Excessive privilege assignment

5. Communication Security (3 items)

Check ItemCWE ReferenceDescription
SSL/TLS CertificateCWE-295Certificate validity and expiration
HTTPS EnforcementCWE-319Non-HTTPS access
Mixed ContentCWE-319HTTP resources within HTTPS pages

6. Plugins & Themes (3 items)

Check ItemCWE ReferenceDescription
Plugin VersionsCWE-1104Versions with known vulnerabilities
Theme VersionsCWE-1104Theme update status
Inactive PluginsCWE-1104Plugins that are disabled but still present

7. PHP Environment (2 items)

Check ItemCWE ReferenceDescription
PHP VersionCWE-1104Use of end-of-life PHP versions
Dangerous PHP FunctionsCWE-78Whether exec/system, etc. are enabled

Score Calculation

Scores are calculated by deducting from a perfect 100 points. Each item is weighted according to its risk level.

Risk LevelDeductionColor
Critical-15 to -20 points🔴 Red
High-8 to -12 points🟠 Orange
Medium-4 to -6 points🟡 Yellow
Low-1 to -3 points🟢 Green

Running the Assessment

  1. Navigate to SentinelSecurityVulnerability Assessment
  2. Click the Run Assessment button
  3. Results for each category are displayed in accordion format
Each check item displays:
  • Status Icon: ✅ Safe / ⚠️ Warning / ❌ Critical
  • Summary: Description of the detected state
  • Impact: Potential damage if this risk is exploited
  • Remediation: Specific steps to fix the issue

Priority-Based Remediation

You do not need to fix everything at once. Address issues in the following priority order:

  1. 🔴 Critical: Fix immediately (core updates, disable debug mode)
  2. 🟠 High: Within one week (plugin updates, password changes)
  3. 🟡 Medium: Within one month (change table prefix, remove unnecessary files)
  4. 🟢 Low: At next scheduled maintenance

Regular Assessment Recommendations

We recommend re-running the assessment at the following times:

  • After WordPress core updates
  • After adding or updating plugins and themes
  • After server environment changes
  • Monthly routine checks