Vulnerability Patcher

Automatically detect known vulnerabilities in your WordPress plugins, themes, and core, apply virtual patches through WAF rules, manage auto-updates by severity, and roll back problematic changes.

Overview

The VistoShield Vulnerability Patcher continuously monitors your WordPress installation for known security vulnerabilities. When a vulnerability is detected, the plugin can apply a virtual patch immediately (blocking the attack vector without modifying plugin files), schedule an automatic update, or notify you for manual action.

Key capabilities include:

  • Synchronized vulnerability database from multiple sources (WPScan, NVD, Patchstack)
  • Scheduled and on-demand vulnerability scanning
  • Virtual patching via WAF rules that block exploit attempts without changing code
  • Severity-based auto-update policies with scheduling controls
  • Automatic pre-update backups with one-click rollback
  • Configurable notifications with severity thresholds

Installation & Activation

  1. Upload the vistoshield-vuln-patcher folder to wp-content/plugins/
  2. Navigate to Plugins → Installed Plugins in your WordPress admin
  3. Click Activate next to VistoShield Vulnerability Patcher
  4. Go to VistoShield → Vuln Patcher to run your first scan
Tip: On activation, the plugin will sync the vulnerability database and perform an initial scan. This may take a few minutes depending on the number of installed plugins and themes.

Vulnerability Database

The plugin maintains a local vulnerability database synchronized from multiple sources:

SourceCoverageSync Frequency
WPScan DatabaseWordPress plugins, themes, and coreEvery 6 hours
National Vulnerability Database (NVD)CVE entries related to WordPress ecosystemEvery 12 hours
PatchstackReal-time virtual patch rules for WordPressEvery 6 hours

You can trigger a manual sync from VistoShield → Vuln Patcher → Database. The database status indicator shows the last sync time and total number of tracked vulnerabilities.

Scanning

Vulnerability scans compare your installed plugins, themes, and WordPress core version against the local vulnerability database.

SettingDefaultDescription
Scan FrequencyTwice dailyHow often automatic scans run. Options: hourly, twice daily, daily, weekly.
Scan ScopeAllWhat to scan: plugins only, themes only, core only, or all.
Include InactiveYesWhether to scan inactive (deactivated) plugins and themes.

To run a manual scan, navigate to VistoShield → Vuln Patcher → Scanner and click Scan Now. Results are displayed immediately and stored in the scan history.

Virtual Patching

Virtual patches protect your site from known exploits without modifying any plugin or theme files. They work by adding targeted WAF rules that block the specific attack vectors associated with a vulnerability.

How virtual patching works:

  1. A vulnerability is identified in one of your installed components
  2. A matching virtual patch rule is fetched from the vulnerability database
  3. The rule is applied to the VistoShield WAF, blocking requests that match the exploit pattern
  4. When the component is updated to a patched version, the virtual patch is automatically removed
SettingDefaultDescription
Auto-Apply Virtual PatchesCritical & HighSeverity levels that trigger automatic virtual patch application
WAF IntegrationEnabledWhether virtual patches are injected into the VistoShield Firewall rules
Patch ModeBlockBlock matching requests or Log-only for monitoring
Warning: Virtual patches are a temporary mitigation measure, not a permanent fix. Always update the affected component to its latest version as soon as possible.

Auto-Updates

Configure automatic updates based on vulnerability severity from VistoShield → Vuln Patcher → Auto-Updates:

SeverityDefault ActionDescription
Critical (9.0–10.0)Immediate updateUpdate is applied as soon as it is available
High (7.0–8.9)Scheduled updateUpdate is queued for the next maintenance window
Medium (4.0–6.9)Notify onlyAdministrator is notified; manual action required
Low (0.1–3.9)Notify onlyLogged for informational purposes with optional notification

Maintenance windows are configurable by day and time. For example, you can set updates to run only on Tuesdays and Thursdays between 02:00 and 04:00 server time.

Rollback

Before every auto-update, the plugin creates a backup of the affected component. If an update causes issues, you can roll back:

  1. Navigate to VistoShield → Vuln Patcher → Update History
  2. Find the problematic update in the list
  3. Click Rollback to restore the previous version
  4. The virtual patch for the vulnerability is automatically re-applied after rollback
SettingDefaultDescription
Backup Retention30 daysHow long component backups are stored before cleanup
Storage Locationwp-content/vs-backups/Directory where pre-update backups are stored
Auto-RollbackDisabledAutomatically rollback if the site returns a 500 error after update

Notifications

Configure alert thresholds and delivery channels from VistoShield → Vuln Patcher → Notifications:

  • Email — Send alerts to one or more email addresses. Supports HTML and plain text formats.
  • Admin Notice — Display a WordPress admin dashboard notice for vulnerabilities at or above the configured severity.
  • Digest Mode — Instead of individual alerts, send a daily or weekly summary of all detected vulnerabilities.

You can set a minimum severity threshold for each notification channel independently. For example, send emails only for Critical and High severity issues while showing Admin Notices for Medium and above.

FAQ

Does the plugin modify my plugin or theme files?

Virtual patches do not modify any files. Auto-updates use the standard WordPress update mechanism, which replaces files in the same way as a manual update from the dashboard.

What happens if a virtual patch causes a false positive?

Navigate to VistoShield → Vuln Patcher → Virtual Patches, find the patch, and switch it to “Log Only” mode. Review the firewall logs to confirm the false positive, then report it via the support channel.

Can I exclude specific plugins from auto-updates?

Yes. From the Auto-Updates settings, you can add plugins and themes to an exclusion list. Excluded components will still be scanned and flagged, but updates must be applied manually.

How much disk space do backups use?

Each backup stores only the plugin or theme ZIP file, typically a few megabytes. The backup retention setting automatically cleans up old backups beyond the configured age.