Files
nuclei-templates/http/vulnerabilities/wordpress/wordpress-user-enum.yaml
2025-10-26 16:17:37 +00:00

33 lines
797 B
YAML

id: wordpress-user-enum
info:
name: Wordpress User Enumeration
author: r3dg33k
severity: info
description: This template detects user enumeration in wordpress.
metadata:
max-request: 1
tags: wordpress,vuln
http:
- method: GET
path:
- "{{BaseURL}}/?author=1"
matchers-condition: and
matchers:
- type: regex
regex:
- '(?i)Location: http(s|):\/\/[\w\.\-]+\/author\/\w+'
part: header
- type: status
status:
- 301
extractors:
- type: regex
part: header
regex:
- 'author\/\w+'
# digest: 4a0a00473045022100db7af37f4686c05daa4bd5ba31ed27b0e71406f367592f1aee8cf1418fc64bdf022068df73ff53f6287923a7a98e568d3e52b20007b27df5d86ef476b621b9f21d3a:922c64590222798bb761d5b6d8e72950