WordPress Detect
ID: wordpress-detect
Severity: info
Author: pdteam,daffainfo,ricardomaia,topscoder,AdamCrosser
Tags: tech,wordpress,cms,wp
Description
Section titled “Description”YAML Source
Section titled “YAML Source”id: wordpress-detect
info: name: WordPress Detect author: pdteam,daffainfo,ricardomaia,topscoder,AdamCrosser severity: info classification: cpe: cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:* metadata: verified: true max-request: 4 vendor: wordpress product: wordpress shodan-query: - http.component:"WordPress" - http.component:"wordpress" - cpe:"cpe:2.3:a:wordpress:wordpress" category: cms tags: tech,wordpress,cms,wp
http: - method: GET path: - "{{BaseURL}}" - "{{BaseURL}}/wp-admin/install.php" - "{{BaseURL}}/feed/" - "{{BaseURL}}/?feed=rss2" # alternative if /feed/ is blocked
redirects: true max-redirects: 2 stop-at-first-match: true
matchers-condition: and matchers: - type: regex regex: - '<generator>https?:\/\/wordpress\.org.*</generator>' - 'wp-login.php' - 'name="generator" content="wordpress' - '<link[^>]+s\d+\.wp\.com' - '<!-- This site is optimized with the Yoast (?:WordPress )?SEO plugin v([\d.]+) -' - '<!--[^>]+WP-Super-Cache' - '/wp-content/uploads/(.*)' condition: or
extractors: - type: regex name: version_by_generator group: 1 regex: - '(?m)https:\/\/wordpress.org\/\?v=([0-9.]+)'
- type: regex name: version_by_js group: 1 regex: - 'wp-emoji-release\.min\.js\?ver=((\d+\.?)+)\b'
- type: regex name: version_by_css group: 1 regex: - 'install\.min\.css\?ver=((\d+\.?)+)\b'# digest: 4b0a0048304602210090f6652297045a17c96f8f135be893c62aec9a03bc16c9b45fcded6d6ecbd568022100b6403b0e0ef72f72e6a2e053e861c577af4bb6e2d4af8ae2e7e3c0290cdbccf1:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/technologies/wordpress-detect.yaml"