Skip to content

WordPress Readme File

ID: wordpress-readme-file

Severity: info

Author: tess

Tags: exposure,wordpress,wp,readme,files

id: wordpress-readme-file
info:
name: WordPress Readme File
author: tess
severity: info
metadata:
verified: true
max-request: 3
shodan-query:
- http.component:"wordpress"
- cpe:"cpe:2.3:a:wordpress:wordpress"
product: wordpress
vendor: wordpress
tags: exposure,wordpress,wp,readme,files
http:
- method: GET
path:
- "{{BaseURL}}/readme.html"
- "{{BaseURL}}/wp/readme.html"
- "{{BaseURL}}/blog/wp/readme.html"
stop-at-first-match: true
matchers-condition: and
matchers:
- type: word
part: body
words:
- 'WordPress › ReadMe'
- type: status
status:
- 200
# digest: 4a0a00473045022100d50bd84a863d743844a53244dc39043557edee0d078a8f238972b31f0a0a174902204ab99bc3750046e246ee0810a0bf6bdfe768eb43706df19abfb366a385b5bc83:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/exposures/files/wordpress-readme-file.yaml"

View on Github