Skip to content

Wordpress - Path Disclosure

ID: wp-full-path-disclosure

Severity: info

Author: arcc

Tags: debug,wordpress,fpd

Wordpress internal file system path of a WordPress installation is exposed or disclosed to unauthorized users.

id: wp-full-path-disclosure
info:
name: Wordpress - Path Disclosure
author: arcc
severity: info
description: Wordpress internal file system path of a WordPress installation is exposed or disclosed to unauthorized users.
reference:
- https://make.wordpress.org/core/handbook/testing/reporting-security-vulnerabilities/#why-are-there-path-disclosures-when-directly-loading-certain-files
- https://core.trac.wordpress.org/ticket/38317
metadata:
max-request: 1
tags: debug,wordpress,fpd
http:
- method: GET
path:
- "{{BaseURL}}/wp-includes/rss-functions.php"
matchers:
- type: word
words:
- 'Call to undefined function _deprecated_file()'
part: body
# digest: 4b0a00483046022100c37746adf02741b253629d0c366359bdeac6de7fa8b5bd56a2f8c972b3772849022100b7b5bd4b990aff9a5a733ca9b641adab53ba87ae866316ac86fc76edb1890ad3:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/vulnerabilities/wordpress/wp-full-path-disclosure.yaml"

View on Github