Skip to content

WordPress xmlrpc

ID: wordpress-xmlrpc-file

Severity: info

Author: udit_thakkur

Tags: wordpress

id: wordpress-xmlrpc-file
info:
name: WordPress xmlrpc
author: udit_thakkur
severity: info
metadata:
max-request: 1
tags: wordpress
http:
- method: GET
path:
- "{{BaseURL}}/xmlrpc.php"
matchers:
- type: word
words:
- 'XML-RPC server accepts POST requests only.'
# digest: 490a0046304402206e71e93ca598f2547b183dbd00107cfcfd9faf3ac909711fb4f48aaf46c09362022042839adba911e2d8b8e3c12345c7ce5ec316424d5cbd4830964354dc8fc5283f:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/vulnerabilities/wordpress/wp-xmlrpc.yaml"

View on Github