Files
nuclei-templates/http/vulnerabilities/wordpress/wordpress-user-enum.yaml

33 lines
797 B
YAML
Raw Normal View History

2021-07-10 21:54:31 +05:30
id: wordpress-user-enum
info:
name: Wordpress User Enumeration
author: r3dg33k
severity: info
2024-01-02 21:15:12 +05:30
description: This template detects user enumeration in wordpress.
metadata:
max-request: 1
tags: wordpress,vuln
2021-07-10 21:54:31 +05:30
http:
2021-07-10 21:54:31 +05:30
- method: GET
path:
- "{{BaseURL}}/?author=1"
matchers-condition: and
matchers:
- type: regex
regex:
- '(?i)Location: http(s|):\/\/[\w\.\-]+\/author\/\w+'
part: header
2023-10-14 16:57:55 +05:30
2021-07-10 21:54:31 +05:30
- type: status
status:
- 301
extractors:
- type: regex
part: header
regex:
- 'author\/\w+'
2025-10-26 16:17:34 +00:00
# digest: 4a0a00473045022100db7af37f4686c05daa4bd5ba31ed27b0e71406f367592f1aee8cf1418fc64bdf022068df73ff53f6287923a7a98e568d3e52b20007b27df5d86ef476b621b9f21d3a:922c64590222798bb761d5b6d8e72950