WPScan API

https://wpscan.com/api

https://wpscan.com/docs/api/v3/

curl -H "Authorization: Token token=API_TOKEN" https://wpscan.com/api/v3/plugins/woocommerce | python3 -mjson.tool
...
            {
                "id": "1212fec8-1fde-41e5-af70-abdd7ffe5379",
                "title": "Woocommerce 3.3 to 5.5 - Authenticated Blind SQL Injection",
                "created_at": "2021-07-15T14:28:21.000Z",
                "updated_at": "2021-07-30T07:46:15.000Z",
                "published_date": "2021-07-15T00:00:00.000Z",
                "description": null,
                "poc": null,
                "vuln_type": "SQLI",
                "references": {
                    "url": [
                        "https://woocommerce.com/posts/critical-vulnerability-detected-july-2021/",
                        "https://twitter.com/WooCommerce/status/1415442447312764931",
                        "https://www.wordfence.com/blog/2021/07/critical-sql-injection-vulnerability-patched-in-woocommerce/",
                        "https://noc.org/2021/07/15/serious-sqli-in-woocommerce/",
                        "https://blog.wpscan.com/critical-woocommerce-vulnerabilities/",
                        "https://github.com/woocommerce/woocommerce/security/advisories/GHSA-7vx5-x39w-q24g"
                    ],
                    "cve": [
                        "2021-32790"
                    ]
                },
                "cvss": null,
                "fixed_in": "5.5.1",
                "introduced_in": "3.3"
            },
...

https://woocommerce.com/posts/critical-vulnerability-detected-july-2021/
各メジャーバージョンで修正されている場合でも fixed_in は最新メジャーバージョンで修正されているバージョンの値になる。