nuclei-templates/exposed-panels/wordpress/wp-install.yaml

30 lines
649 B
YAML

id: wp-install
info:
name: WordPress Installation Panel - Detect
author: princechaddha
severity: high
description: WordPress installation panel was detected.
reference:
- https://smaranchand.com.np/2020/04/misconfigured-wordpress-takeover-to-remote-code-execution/
tags: panel,wordpress
requests:
- method: GET
path:
- "{{BaseURL}}/wp-admin/install.php"
matchers-condition: and
matchers:
- type: word
words:
- "<title>WordPress ? Installation</title>"
- "Site Title"
condition: and
- type: status
status:
- 200
# Enhanced by md on 2023/01/26