WordPress

How to Detect

If you visit https://target.com and see the source code, you will see the links to themes and plugins from WordPress. Or you can visit https://target.com/wp-login.php, it is the WordPress login admin page

  1. Find the related CVE by checking the core, plugins, and theme version

  • How to find the wordpress version

https://target.com/feed
https://target.com/?feed=rss2
  • How to find the plugin version

https://target.com/wp-content/plugins/PLUGINNAME/readme.txt
https://target.com/wp-content/plugins/PLUGINNAME/readme.TXT
https://target.com/wp-content/plugins/PLUGINNAME/README.txt
https://target.com/wp-content/plugins/PLUGINNAME/README.TXT

or change readme.txt to changelog.txt or readme.md

  • How to find the theme version

https://target.com/wp-content/themes/THEMENAME/style.css
https://target.com/wp-content/themes/THEMENAME/readme.txt (If they have readme file)

If you found outdated core / plugins / themes, find the exploit at https://wpscan.com

  1. Finding log files

  1. Finding backup file wp-config

  1. Get the username on the website

or

  1. Bruteforce

or

  1. XSPA in wordpress

  1. Register enabled

if SSL peer certificate or SSH remote key was not OK use --disable-tls-checks

Last updated