Ethical Hacking Automation

Automate Recon and scanning process with Vidoc. All security teams in one place

WordPress Setup Configuration

By kannthu

Vidoc logoVidoc Module

WordPress Setup Configuration

What is the "WordPress Setup Configuration?"

The WordPress Setup Configuration module is designed to detect misconfigurations in the setup process of a WordPress installation. It specifically targets the WordPress setup page where database connection details are entered. This module has a high severity level, indicating that it can potentially expose sensitive information or lead to security vulnerabilities if misconfigurations are present. The original author of this module is not specified.


If misconfigurations are detected during the WordPress setup process, it can have various impacts on the security and functionality of the WordPress installation. These misconfigurations may include incorrect database connection details, insecure file permissions, or weak security settings. Such misconfigurations can potentially lead to unauthorized access, data breaches, or compromised website functionality.

How the module works?

The WordPress Setup Configuration module works by sending an HTTP GET request to the "/wp-admin/setup-config.php?step=1" path of the WordPress installation. It then applies matching conditions to determine if misconfigurations are present. The matching conditions include:

- Matcher 1: It checks if the response contains the phrase "Below you should enter your database connection details." - Matcher 2: It checks if the response status code is 200 (OK).

If both matching conditions are met, the module identifies the presence of misconfigurations in the WordPress setup configuration.

Example HTTP request:

GET /wp-admin/setup-config.php?step=1

Note: The above example is a simplified representation of the HTTP request. Actual requests may contain additional headers or parameters.

Module preview

Concurrent Requests (1)
1. HTTP Request template
Matching conditions
word: Below you should enter your database con...and
status: 200
Passive global matcher
No matching conditions.
On match action
Report vulnerability