One of the strangest experiences we have had with trying to get a vulnerability fixed involved the plugin WP Fastest Cache. After we had dug into the details that Wordfence failed to include when they disclosed a couple of vulnerabilities in that plugin, we noticed they had missed part of the vulnerabilities (which would be a good reason for them to fully disclose ...
To read the rest of this post you need to have an active account with our service.
For existing customers, please log in to your account to view the rest of the post.
If you are not currently a customer, when you sign up now you can try the service for half off (there are a lot of other reason that you will want to sign up beyond access to posts like this one).
If you are a WordPress plugin security researcher please contact us to get free access to all of our Vulnerability Details posts.