Wordpress Sites Vulnerabilities Scanner avatar
Wordpress Sites Vulnerabilities Scanner

Pricing

$4.99/month + usage

Go to Store
Wordpress Sites Vulnerabilities Scanner

Wordpress Sites Vulnerabilities Scanner

Developed by

Miso

Miso

Maintained by Community

Check wordpress site(s) for their vulnerabilities based on Wordfence vulnerabilities database. Bulk check hundreds WP sites at once if needed.

0.0 (0)

Pricing

$4.99/month + usage

0

Total users

1

Monthly users

1

Runs succeeded

>99%

Last modified

6 days ago

You can access the Wordpress Sites Vulnerabilities Scanner programmatically from your own applications by using the Apify API. You can also choose the language preference from below. To use the Apify API, you’ll need an Apify account and your API token, found in Integrations settings in Apify Console.

$# Start Server-Sent Events (SSE) session and keep it running
<curl "https://actors-mcp-server.apify.actor/sse?token=<YOUR_API_TOKEN>&actors=xmiso_scrapers/wordpress-sites-vulnerabilities-scanner"
# Session id example output:
# event: endpoint
# data: /message?sessionId=9d820491-38d4-4c7d-bb6a-3b7dc542f1fa

Using Wordpress Sites Vulnerabilities Scanner via Model Context Protocol (MCP) server

MCP server lets you use Wordpress Sites Vulnerabilities Scanner within your AI workflows. Send API requests to trigger actions and receive real-time results. Take the received sessionId and use it to communicate with the MCP server. The message starts the Wordpress Sites Vulnerabilities Scanner Actor with the provided input.

$curl -X POST "https://actors-mcp-server.apify.actor/message?token=<YOUR_API_TOKEN>&session_id=<SESSION_ID>" -H "Content-Type: application/json" -d '{
$ "jsonrpc": "2.0",
$ "id": 1,
$ "method": "tools/call",
$ "params": {
$ "arguments": {
$ "urls": [
$ "https://bluewatermn.com/contact-us/",
$ "http://www.adoraela.com/",
$ "http://www.treslitrosbeer.co/",
$ "https://bayoucitybins.com/",
$ "https://flagwaterproofing.com/",
$ "https://tonguetiephoenix.com/",
$ "https://carscashforjunkclunkersyonkersny.com/",
$ "https://elastostar.com/",
$ "https://www.ivyrehab.com/location/lawrenceville-nj/",
$ "http://ek9training.com/",
$ "http://www.fgyonline.com/",
$ "https://brentwdavis.com/",
$ "http://www.goodneighborbarber.com/",
$ "http://curiositysatisfieddogcamp.com/",
$ "http://aneesupholstery.com/",
$ "https://daytonphysicians.com/hematology-and-oncology-team/",
$ "http://www.csd-epi.com/",
$ "http://celekmediaconsulting.com/",
$ "https://www.cloudlogix.io/",
$ "https://www.airrosti.com/provider/Kevine-Norris-DC/"
$ ]
$},
$ "name": "xmiso_scrapers/wordpress-sites-vulnerabilities-scanner"
$ }
$}'

The response should be: Accepted. You should received response via SSE (JSON) as:

$event: message
$data: {
$ "result": {
$ "content": [
$ {
$ "type": "text",
$ "text": "ACTOR_RESPONSE"
$ }
$ ]
$ }
$}

Configure local MCP Server via standard input/output for Wordpress Sites Vulnerabilities Scanner

You can connect to the MCP Server using clients like ClaudeDesktop and LibreChat or build your own. The server can run both locally and remotely, giving you full flexibility. Set up the server in the client configuration as follows:

{
"mcpServers": {
"actors-mcp-server": {
"command": "npx",
"args": [
"-y",
"@apify/actors-mcp-server",
"--actors",
"xmiso_scrapers/wordpress-sites-vulnerabilities-scanner"
],
"env": {
"APIFY_TOKEN": "<YOUR_API_TOKEN>"
}
}
}
}

You can further access the MCP client through the Tester MCP Client, a chat user interface to interact with the server.

To get started, check out the documentation and example clients. If you are interested in learning more about our MCP server, check out our blog post.