Files
nuclei-templates/http/vulnerabilities/wordpress/wp-full-path-disclosure.yaml
2025-10-26 16:17:37 +00:00

25 lines
923 B
YAML

id: wp-full-path-disclosure
info:
name: Wordpress - Path Disclosure
author: arcc
severity: info
description: Wordpress internal file system path of a WordPress installation is exposed or disclosed to unauthorized users.
reference:
- https://make.wordpress.org/core/handbook/testing/reporting-security-vulnerabilities/#why-are-there-path-disclosures-when-directly-loading-certain-files
- https://core.trac.wordpress.org/ticket/38317
metadata:
max-request: 1
tags: debug,wordpress,fpd,vuln
http:
- method: GET
path:
- "{{BaseURL}}/wp-includes/rss-functions.php"
matchers:
- type: word
words:
- 'Call to undefined function _deprecated_file()'
part: body
# digest: 4b0a00483046022100a633abf8b940ffc3456d7c30287dd81d0f15844b502753ea08fe64a9940837e7022100ec6a958968e4f252e265a8a37dee51a50111b156f7ec661c4d5d035af4f7ab4c:922c64590222798bb761d5b6d8e72950