id: wordpress-upload-data info: name: wordpress-upload-data author: pussycat0x severity: medium description: The remote WordPress installation contains a file 'data.txt' under the '/wp-content/uploads/' folder that has sensitive information inside it. reference: https://www.exploit-db.com/ghdb/7040 tags: wordpress,listing metadata: max-request: 1 http: - method: GET path: - "{{BaseURL}}/wp-content/uploads/data.txt" matchers-condition: and matchers: - type: word words: - "admin:" - type: word part: header words: - "text/plain" - type: status status: - 200