WordPress powers roughly 43% of all websites on the internet.1 It also accounts for more than 90% of all CMS-targeted attacks.2 That ratio is not a coincidence.
Understanding why WordPress is so frequently targeted requires understanding something about how it is built — and why the thing that makes it popular is the same thing that makes it vulnerable.
The Scale of the Problem
Wordfence, which operates one of the largest WordPress security platforms, has documented an average of 90,000 attacks per minute targeting WordPress sites.3 Patchstack's 2024 State of WordPress Security report found that 11,334 new vulnerabilities were disclosed in the WordPress ecosystem in 2024 alone — a 42% increase compared to the previous year.4
These are not minor advisories. Patchstack found that 17% of 2024 vulnerabilities carried a high severity score, meaning they were candidates for automated, mass-scale exploitation.4
The Plugin Problem
WordPress without plugins is a basic blogging platform. WordPress with plugins is everything from an e-commerce store to a booking system. That flexibility is the product. Plugins are also the attack surface.
In 2024, plugins were the source of 96.77% of all newly disclosed WordPress vulnerabilities, according to Patchstack's annual security report.4 The WordPress core itself is comparatively secure. The problem is everything built on top of it.
Each plugin is a separate codebase, maintained by a separate developer, with its own update cycle and security practices. When a researcher finds a flaw in a popular plugin, exploitation often begins within hours of disclosure — before most site owners have had a chance to apply a patch.
The Attack Is Automated
This is the part most business owners misunderstand. Nobody is targeting your specific site. The attacks are automated — bots scanning millions of sites continuously, checking for known vulnerable plugin versions, weak passwords, exposed configuration files.
Patchstack found that plugin and theme developers failed to provide a timely fix for 46% of disclosed vulnerabilities in 2024.4 Site owners were left exposed with no patch available, regardless of how diligent they were about updating.
What Happens After a Hack
The most common WordPress compromises are not dramatic. The attacker is not interested in destroying your site — they are interested in using it. According to Sucuri's research, the most common outcomes include SEO spam injection, malicious redirects sending mobile visitors to scam sites, and use of your server as a spam relay — which gets your domain blacklisted.5
Google's Safe Browsing service blacklists approximately 70,000 websites per week for malware or phishing.6
The Structural Fix
Patching plugins faster helps. A security scanner helps. Two-factor authentication helps. None of it eliminates the underlying problem, which is architectural: WordPress sites are running applications. Running applications have attack surface.
A static HTML site is not a running application. It is a file. Files cannot be injected with PHP. Files cannot relay spam. Files cannot have their admin panel brute-forced because there is no admin panel. This is not a configuration choice — it is a structural property of how the site works.
| Attack Vector | WordPress | Static HTML |
|---|---|---|
| Plugin vulnerabilities | Yes — 96.77% of 2024 disclosures | Not applicable |
| Database injection | Yes | Not applicable |
| Admin brute force | Yes | Not applicable — no admin panel |
| PHP code execution | Yes | Not applicable — no PHP |
| File tampering | Possible via plugin or FTP | Requires direct hosting compromise |
See What WordPress Is Costing You
Use our free calculator — enter your real numbers and see the 3-year comparison.
- W3Techs. Usage Statistics and Market Share of WordPress. Updated continuously. w3techs.com
- Sucuri. Hacked Website Trend Report, 2021. WordPress accounted for 95.6% of CMS infections in Sucuri's remediation dataset. sucuri.net/reports
- Wordfence Threat Intelligence. Attack volume cited across multiple Wordfence annual reports and threat intelligence posts. wordfence.com/blog
- Patchstack. State of WordPress Security 2024. Published 2025. Figures: 11,334 new vulnerabilities; 42% YoY increase; 96.77% from plugins; 46% without timely patch; 17% high severity. patchstack.com/whitepaper
- Sucuri. Website Threat Research Report. Annual series documenting most common malware types and infection outcomes. sucuri.net/reports
- Google Safe Browsing figures referenced in Google Transparency Report. transparencyreport.google.com