
Security News
Attackers Are Hunting High-Impact Node.js Maintainers in a Coordinated Social Engineering Campaign
Multiple high-impact npm maintainers confirm they have been targeted in the same social engineering campaign that compromised Axios.
mcp-wp-abilities
Advanced tools
MCP server for WordPress 6.9+ Abilities API - dynamically exposes WordPress abilities as AI-accessible tools
MCP server for the WordPress 6.9+ Abilities API. Dynamically discovers and exposes WordPress abilities as AI-accessible tools.
WordPress 6.9 introduced the Abilities API, a standardized framework for exposing WordPress capabilities through REST endpoints in a machine-readable format. This MCP server connects to any WordPress 6.9+ site and automatically discovers and exposes all registered abilities as MCP tools.
Key features:
npm install -g mcp-wp-abilities
The server requires three environment variables:
| Variable | Description |
|---|---|
WORDPRESS_URL | Your WordPress site URL (e.g., https://example.com) |
WORDPRESS_USERNAME | WordPress username |
WORDPRESS_APP_PASSWORD | Application password (Settings → Security → Application Passwords) |
Add to ~/Library/Application Support/Claude/claude_desktop_config.json:
{
"mcpServers": {
"wp-abilities": {
"command": "npx",
"args": ["-y", "mcp-wp-abilities"],
"env": {
"WORDPRESS_URL": "https://your-site.com",
"WORDPRESS_USERNAME": "your-username",
"WORDPRESS_APP_PASSWORD": "your-app-password"
}
}
}
}
claude mcp add wp-abilities \
-e WORDPRESS_URL="https://your-site.com" \
-e WORDPRESS_USERNAME="your-username" \
-e WORDPRESS_APP_PASSWORD="your-app-password" \
-- npx -y mcp-wp-abilities
Tools are dynamically discovered from your WordPress site. Core WordPress 6.9 includes:
| Tool | Description |
|---|---|
wp_core_get_site_info | Get site name, description, URL, version, language, etc. |
wp_core_get_environment_info | Get PHP version, database info, environment type |
Additional abilities registered by plugins will appear automatically.
wp_{category}_{ability_name} (e.g., wp_core_get_site_info)readOnlyHint, destructiveHint, idempotentHintWordPress plugins can register custom abilities that will automatically appear as MCP tools:
add_action( 'wp_abilities_api_init', function() {
wp_register_ability( 'myplugin/my-ability', [
'label' => 'My Custom Ability',
'description' => 'Does something useful',
'category' => 'myplugin',
'input_schema' => [
'type' => 'object',
'properties' => [
'param' => [ 'type' => 'string' ],
],
],
'output_schema' => [
'type' => 'object',
'properties' => [
'result' => [ 'type' => 'string' ],
],
],
'execute_callback' => 'my_ability_handler',
'permission_callback' => fn() => current_user_can( 'manage_options' ),
'meta' => [
'show_in_rest' => true,
'annotations' => [
'readonly' => false,
'destructive' => false,
'idempotent' => true,
],
],
] );
} );
"Missing required environment variables"
"Failed to discover abilities: 401"
"Failed to discover abilities: 404"
No tools appearing
show_in_rest: trueContributions are welcome! Please feel free to submit a Pull Request.
See CHANGELOG.md for release history.
MIT
FAQs
MCP server for WordPress 6.9+ Abilities API - dynamically exposes WordPress abilities as AI-accessible tools
We found that mcp-wp-abilities demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Security News
Multiple high-impact npm maintainers confirm they have been targeted in the same social engineering campaign that compromised Axios.

Security News
Axios compromise traced to social engineering, showing how attacks on maintainers can bypass controls and expose the broader software supply chain.

Security News
Node.js has paused its bug bounty program after funding ended, removing payouts for vulnerability reports but keeping its security process unchanged.