Ethical Hacking Automation

Automate Recon and scanning process with Vidoc. All security teams in one place

WordPress Plugin Arforms Listing

By kannthu

Vidoc logoVidoc Module

What is the "WordPress Plugin Arforms Listing?"

The "WordPress Plugin Arforms Listing" module is designed to detect sensitive directories present in the arforms plugin. Arforms is a popular WordPress plugin used for creating and managing forms on websites. This module focuses on identifying potential misconfigurations or vulnerabilities within the plugin.

This module has an informative severity level, which means it provides valuable information but does not directly indicate a security risk.

Author: pussycat0x


This module does not directly impact the functionality or security of the arforms plugin. Instead, it aims to identify potential vulnerabilities or misconfigurations that could be exploited by attackers. By detecting these issues, website owners can take appropriate measures to secure their arforms plugin installation.

How does the module work?

The "WordPress Plugin Arforms Listing" module utilizes HTTP request templates and matching conditions to scan for specific indicators of sensitive directories within the arforms plugin.

One example of an HTTP request used by this module is:

GET /wp-content/plugins/arforms/

This request is sent to the target website's server, specifically targeting the "arforms" plugin directory. The module then applies matching conditions to determine if the response indicates the presence of sensitive directories.

The matching conditions used by this module are:

- Matcher 1: Checks if the response contains the phrases "Index of" and "wp-content/plugins/arforms/". - Matcher 2: Verifies if the response status code is 200 (indicating a successful request).

If both matching conditions are met, the module reports the potential presence of sensitive directories within the arforms plugin.

For more information, you can refer to the reference.

Metadata: max-request: 1

Module preview

Concurrent Requests (1)
1. HTTP Request template
Matching conditions
word: Index of, wp-content/plugins/arforms/and
status: 200
Passive global matcher
No matching conditions.
On match action
Report vulnerability