Ethical Hacking Automation

Automate Recon and scanning process with Vidoc. All security teams in one place

WordPress Plugin dzs zoomsounds

By kannthu

Vidoc logoVidoc Module

What is the "WordPress Plugin dzs zoomsounds?"

The "WordPress Plugin dzs zoomsounds" module is designed to detect sensitive directories present in the dzs-zoomsounds plugin. This plugin is specifically targeted for WordPress websites. The severity of this module is classified as informative, meaning it provides valuable information but does not pose a direct vulnerability. The original author of this module is pussycat0x.


This module does not directly impact the security of the website. Instead, it helps identify potential misconfigurations or vulnerabilities within the dzs-zoomsounds plugin. By detecting sensitive directories, website owners can take necessary actions to secure their WordPress installations.

How the module works?

The "WordPress Plugin dzs zoomsounds" module works by sending HTTP requests to the "/wp-content/plugins/dzs-zoomsounds/" path of the WordPress website. It then applies matching conditions to determine if the requested path contains specific keywords, such as "Index of" and "/wp-content/plugins/dzs-zoomsounds". Additionally, it checks if the response status is 200 (OK). If all conditions are met, the module reports the presence of sensitive directories.

Here is an example of an HTTP request sent by the module:

GET /wp-content/plugins/dzs-zoomsounds/

The matching conditions used by the module are:

- Check if the requested path contains the keywords "Index of" and "/wp-content/plugins/dzs-zoomsounds" - Verify that the response status is 200 (OK)

By analyzing the results of this module, website owners can identify potential security risks associated with the dzs-zoomsounds plugin and take appropriate measures to mitigate them.

Module preview

Concurrent Requests (1)
1. HTTP Request template
Matching conditions
word: Index of, /wp-content/plugins/dzs-zoomso...and
status: 200
Passive global matcher
No matching conditions.
On match action
Report vulnerability