Ethical Hacking Automation

Automate Recon and scanning process with Vidoc. All security teams in one place


By kannthu

Vidoc logoVidoc Module

Module: wordpress-upload-data

What is the "wordpress-upload-data" module?

The "wordpress-upload-data" module is a test case designed to detect misconfigurations or vulnerabilities in remote WordPress installations. It focuses on identifying the presence of a file named 'data.txt' within the '/wp-content/uploads/' folder, which may contain sensitive information. The severity of this module is classified as medium.

Author: pussycat0x


If the "wordpress-upload-data" module detects the presence of the 'data.txt' file, it indicates a potential security risk. The file may contain sensitive information that could be accessed by unauthorized individuals, potentially leading to data breaches or other malicious activities.

How does the module work?

The "wordpress-upload-data" module utilizes HTTP request templates and matching conditions to identify the presence of the 'data.txt' file. It sends a GET request to the '/wp-content/uploads/data.txt' path and applies the following matching conditions:

- The response body must contain the word "admin:" - The response headers must include the word "text/plain" - The response status code must be 200 (OK)

If all of these conditions are met, the module considers the 'data.txt' file to be present and potentially containing sensitive information.

Example HTTP request:

GET /wp-content/uploads/data.txt

Matching conditions:

- Response body contains the word "admin:" - Response headers include the word "text/plain" - Response status code is 200 (OK)

For more information, refer to the exploit-db reference.

Metadata: max-request: 1

Module preview

Concurrent Requests (1)
1. HTTP Request template
Matching conditions
word: admin:and
word: text/plainand
status: 200
Passive global matcher
No matching conditions.
On match action
Report vulnerability