π·WordPress
Manual
Information Gathering
license.txt (wordpress version)
wp-activate.php
wp-content/uploads/
wp-includes/
wp-config.php
# get wordpress version
curl https://victim.com/ | grep 'content="WordPress'Users / IP
Check for usernames : /wp-json/wp/v2/users
Could leak IP addresses : /wp-json/wp/v2/pages
# get author name = potential user
curl -s -I -X GET http://blog.example.com/?author=1xmlrpc.php
Active
Credentials brute-force or use it to launch DoS attacks
Exploit
SSRF
/wp-json/oembed/1.0/proxy
Try
WPScan
Commands - with API
Default
Private Commands - with API
Last updated
Was this helpful?