📃Crucial WordPress Security Misconfiguration You Need to Know
# Common WordPress Security Misconfigurations
This document outlines various common security misconfigurations in WordPress, providing insights into how these issues can be detected, exploited, and references to learn more about them.
## Table of Contents
* [WordPress Detection](#wordpress-detection)
* [General Scan Tools](#general-scan-tools)
* [Admin Panel](#admin-panel)
* [CVE-2018-6389](#cve-2018-6389)
* [xmlrpc.php](#xmlrpcphp)
* [Denial of Service via Cronjob](#denial-of-service-via-cronjob)
* [Denial of Service via load-scripts.php (CVE-2018-6389)](#denial-of-service-via-load-scriptsphp-cve-2018-6389)
* [WP User Enumeration](#wp-user-enumeration)
* [Sensitive Files Exposed](#sensitive-files-exposed)
* [Bypassing 403 Errors](#bypassing-403-errors)
* [Enumerating Plugins](#enumerating-plugins)
* [Finding the Origin IP in WordPress](#finding-the-origin-ip-in-wordpress)
* [References](#references)
### WordPress Detection<a name="wordpress-detection"></a>
markdown
# WordPress Detection
# To identify if a website is using WordPress, employ technology detection tools such as:
# - Wappalyzer
# - WhatRuns
# - BuiltWithGeneral Scan Tools
Admin Panel
CVE-2018-6389
xmlrpc.php
Denial of Service via Cronjob
Denial of Service via load-scripts.php (CVE-2018-6389)
WP User Enumeration
Sensitive Files Exposed
Bypassing 403 Errors
Enumerating Plugins
Finding the Origin IP in WordPress
References
Please note that this document provides information and commands in a structured and professional format for addressing common WordPress security misconfiguration.
Last updated
Was this helpful?