Ethical Hacking Automation

Automate Recon and scanning process with Vidoc. All security teams in one place

Wordpress Plugin MStore API

By kannthu

Vidoc logoVidoc Module

What is the "Wordpress Plugin MStore API?"

The "Wordpress Plugin MStore API" module is designed to detect sensitive directories present in the mstore-api plugin for Wordpress. It is a module used in the Vidoc platform to perform scanning and identify potential misconfigurations or vulnerabilities in the plugin.

This module has a low severity level, indicating that the detected issues may not pose a significant threat but should still be addressed to ensure the security of the Wordpress installation.

This module was authored by pussycat0x.


If sensitive directories are found in the mstore-api plugin, it could potentially expose sensitive information or provide unauthorized access to certain files or functionalities. This could lead to data breaches, unauthorized modifications, or other security risks.

How does the module work?

The "Wordpress Plugin MStore API" module works by sending HTTP requests to the "/wp-content/plugins/mstore-api/" path of the Wordpress website. It then applies matching conditions to determine if the response indicates the presence of sensitive directories.

One example of a matching condition is checking if the response contains the words "Index of" and "/wp-content/plugins/mstore-api". Additionally, the module checks if the HTTP status code is 200, indicating a successful response.

By analyzing the responses and matching conditions, the module can identify potential misconfigurations or vulnerabilities in the mstore-api plugin.

Module preview

Concurrent Requests (1)
1. HTTP Request template
Matching conditions
word: Index of, /wp-content/plugins/mstore-apiand
status: 200
Passive global matcher
No matching conditions.
On match action
Report vulnerability