Files
nuclei-templates/http/vulnerabilities/wordpress/wordpress-emergency-script.yaml

32 lines
917 B
YAML
Raw Normal View History

2020-09-08 22:53:54 +07:00
id: wordpress-emergency-script
info:
name: WordPress Emergency Script
author: dwisiswant0
severity: info
2024-01-02 21:15:12 +05:30
description: Exposed wordpress password reset emergency script.
reference:
- https://wordpress.org/support/article/resetting-your-password/#using-the-emergency-password-reset-script
metadata:
max-request: 1
tags: wordpress,vuln
2020-09-08 22:53:54 +07:00
http:
2020-09-08 22:53:54 +07:00
- method: GET
path:
- "{{BaseURL}}/emergency.php"
2020-09-20 18:27:43 +05:30
2020-09-08 22:53:54 +07:00
matchers-condition: and
matchers:
- type: word
words:
- "Your use of this script is at your sole risk"
- "WordPress Administrator"
- "Update Options"
condition: and
part: body
2023-10-14 16:57:55 +05:30
2020-09-08 22:53:54 +07:00
- type: status
status:
2023-10-14 16:57:55 +05:30
- 200
2025-10-26 16:17:34 +00:00
# digest: 4a0a00473045022100b96bda1d23e42edde0c7b00595c2c0224dc6d9379926a1c5018294629b1eb53402205e141e9f11c555a542faa26f391267544daae31251d4ba63e1bdf7b25bdf57fd:922c64590222798bb761d5b6d8e72950