Page cover

📃Crucial WordPress Security Misconfiguration You Need to Know

✖️ Twitter 🔗 Linkedin 📺 Telegram 🎉 Instagram

# Common WordPress Security Misconfigurations

This document outlines various common security misconfigurations in WordPress, providing insights into how these issues can be detected, exploited, and references to learn more about them.

## Table of Contents
* [WordPress Detection](#wordpress-detection)
* [General Scan Tools](#general-scan-tools)
* [Admin Panel](#admin-panel)
* [CVE-2018-6389](#cve-2018-6389)
* [xmlrpc.php](#xmlrpcphp)
* [Denial of Service via Cronjob](#denial-of-service-via-cronjob)
* [Denial of Service via load-scripts.php (CVE-2018-6389)](#denial-of-service-via-load-scriptsphp-cve-2018-6389)
* [WP User Enumeration](#wp-user-enumeration)
* [Sensitive Files Exposed](#sensitive-files-exposed)
* [Bypassing 403 Errors](#bypassing-403-errors)
* [Enumerating Plugins](#enumerating-plugins)
* [Finding the Origin IP in WordPress](#finding-the-origin-ip-in-wordpress)
* [References](#references)

### WordPress Detection<a name="wordpress-detection"></a>
markdown
# WordPress Detection
# To identify if a website is using WordPress, employ technology detection tools such as:
# - Wappalyzer
# - WhatRuns
# - BuiltWith

General Scan Tools

Admin Panel

CVE-2018-6389

xmlrpc.php

Denial of Service via Cronjob

Denial of Service via load-scripts.php (CVE-2018-6389)

WP User Enumeration

Sensitive Files Exposed

Bypassing 403 Errors

Enumerating Plugins

Finding the Origin IP in WordPress

References

Please note that this document provides information and commands in a structured and professional format for addressing common WordPress security misconfiguration.

Last updated

Was this helpful?