WPScan is a set of ruby scripts you can use to extract WordPress information
I used WPScan to find and fix common vulnerabilities on his WordPress site (actually an e-commerce)
Everything is self-explanatory:
netto@talvisota ~/Downloads/wpscan $ sudo ruby2.2 wpscan.rb -e tt,u,ap,at --url www.yourdomain.com
_______________________________________________________________
__ _______ _____
\ \ / / __ \ / ____|
\ \ /\ / /| |__) | (___ ___ __ _ _ __
\ \/ \/ / | ___/ \___ \ / __|/ _` | '_ \
\ /\ / | | ____) | (__| (_| | | | |
\/ \/ |_| |_____/ \___|\__,_|_| |_|
WordPress Security Scanner by the WPScan Team
Version 2.9.1
Sponsored by Sucuri - https://sucuri.net
@_WPScan_, @ethicalhack3r, @erwan_lr, pvdl, @_FireFart_
_______________________________________________________________
[i] The remote host tried to redirect to: http://yourdomain.com/
[?] Do you want follow the redirection ? [Y]es [N]o [A]bort, default: [N]y
[+] URL: http://yourdomain.com/
[+] Started: Mon Jul 4 00:12:22 2016
[+] robots.txt available under: 'http://yourdomain.com/robots.txt'
[+] Interesting entry from robots.txt: http://yourdomain.com/wp-admin/admin-ajax.php
[!] The WordPress 'http://yourdomain.com/readme.html' file exists exposing a version number
[!] Full Path Disclosure (FPD) in 'http://yourdomain.com/wp-includes/rss-functions.php':
[+] Interesting header: LINK: http://yourdomain.com/wp-json/; rel="https://api.w.org/", http://yourdomain.com/; rel=shortlink
[+] Interesting header: SERVER: nginx/1.10.1
[+] XML-RPC Interface available under: http://yourdomain.com/xmlrpc.php
[!] Upload directory has directory listing enabled: http://yourdomain.com/wp-content/uploads/
[!] Includes directory has directory listing enabled: http://yourdomain.com/wp-includes/
[+] WordPress version 4.5.3 (Released on 2016-06-21) identified from meta generator, advanced fingerprinting, readme, links opml,
stylesheets numbers
[+] WordPress theme in use: shopkeeper-child - v1.0
[+] Name: shopkeeper-child - v1.0
| Location: http://yourdomain.com/wp-content/themes/shopkeeper-child/
[!] Directory listing is enabled: http://yourdomain.com/wp-content/themes/shopkeeper-child/
| Style URL: http://yourdomain.com/wp-content/themes/shopkeeper-child/style.css
| Theme Name: Shopkeeper Child
| Theme URI: http://shopkeeper.getbowtied.com/
| Description: This is a child theme for Shopkeeper.
| Author: Get Bowtied
| Author URI: http: //www.getbowtied.com/
[+] Detected parent theme: shopkeeper - v1.6.6
[+] Name: shopkeeper - v1.6.6
| Location: http://yourdomain.com/wp-content/themes/shopkeeper/
| Style URL: http://yourdomain.com/wp-content/themes/shopkeeper/style.css
| Theme Name: Shopkeeper
| Theme URI: http://www.getbowtied.com/
| Description: Shopkeeper is a responsive, super-mobile-friendly theme for WordPress and WooCommerce.
| Author: Get Bowtied
| Author URI: http://www.getbowtied.com/
[+] Enumerating plugins from passive detection ...
| 4 plugins found:
[+] Name: js_composer
| Location: http://yourdomain.com/wp-content/plugins/js_composer/
[!] We could not determine a version so all vulnerabilities are printed out
[!] Title: Visual Composer = 4.7.3 - Multiple Unspecified Cross-Site Scripting (XSS)
Reference: https://wpvulndb.com/vulnerabilities/8208
Reference: http://codecanyon.net/item/visual-composer-page-builder-for-wordpress/242431
Reference: https://forums.envato.com/t/visual-composer-security-vulnerability-fix/10494/7
[i] Fixed in: 4.7.4
[+] Name: revslider
| Location: http://yourdomain.com/wp-content/plugins/revslider/
[!] We could not determine a version so all vulnerabilities are printed out
[!] Title: WordPress Slider Revolution Local File Disclosure
Reference: https://wpvulndb.com/vulnerabilities/7540
Reference: http://blog.sucuri.net/2014/09/slider-revolution-plugin-critical-vulnerability-being-exploited.html
Reference: http://marketblog.envato.com/general/affected-themes/
Reference: http://packetstormsecurity.com/files/129761/
Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1579
Reference: https://www.exploit-db.com/exploits/34511/
Reference: https://www.exploit-db.com/exploits/36039/
[i] Fixed in: 4.1.5
[!] Title: WordPress Slider Revolution Shell Upload
Reference: https://wpvulndb.com/vulnerabilities/7954
Reference: https://whatisgon.wordpress.com/2014/11/30/another-revslider-vulnerability/
Reference: https://www.rapid7.com/db/modules/exploit/unix/webapp/wp_revslider_upload_execute
Reference: https://www.exploit-db.com/exploits/35385/
[i] Fixed in: 3.0.96
[+] Name: yith-product-size-charts-for-woocommerce - v1.0.9
| Latest version: 1.0.9 (up to date)
| Location: http://yourdomain.com/wp-content/plugins/yith-product-size-charts-for-woocommerce/
| Readme: http://yourdomain.com/wp-content/plugins/yith-product-size-charts-for-woocommerce/README.txt
[!] Directory listing is enabled: http://yourdomain.com/wp-content/plugins/yith-product-size-charts-for-woocommerce/
[+] Name: yith-woocommerce-wishlist - v2.0.16
| Latest version: 2.0.16 (up to date)
| Location: http://yourdomain.com/wp-content/plugins/yith-woocommerce-wishlist/
| Readme: http://yourdomain.com/wp-content/plugins/yith-woocommerce-wishlist/README.txt
[!] Directory listing is enabled: http://yourdomain.com/wp-content/plugins/yith-woocommerce-wishlist/
[+] Enumerating all plugins (may take a while and use a lot of system resources) ...
Time: 13:57:09 ========================================================================= (60945 / 60945) 100.00% Time: 13:57:09
[+] We found 6 plugins:
[+] Name: js_composer
| Location: http://yourdomain.com/wp-content/plugins/js_composer/
[!] We could not determine a version so all vulnerabilities are printed out
[!] Title: Visual Composer = 4.7.3 - Multiple Unspecified Cross-Site Scripting (XSS)
Reference: https://wpvulndb.com/vulnerabilities/8208
Reference: http://codecanyon.net/item/visual-composer-page-builder-for-wordpress/242431
Reference: https://forums.envato.com/t/visual-composer-security-vulnerability-fix/10494/7
[i] Fixed in: 4.7.4
[+] Name: maintenance
| Latest version: 3.0
| Location: http://yourdomain.com/wp-content/plugins/maintenance/
[!] Directory listing is enabled: http://yourdomain.com/wp-content/plugins/maintenance/
[+] Name: revslider
| Location: http://yourdomain.com/wp-content/plugins/revslider/
[!] We could not determine a version so all vulnerabilities are printed out
[!] Title: WordPress Slider Revolution Local File Disclosure
Reference: https://wpvulndb.com/vulnerabilities/7540
Reference: http://blog.sucuri.net/2014/09/slider-revolution-plugin-critical-vulnerability-being-exploited.html
Reference: http://marketblog.envato.com/general/affected-themes/
Reference: http://packetstormsecurity.com/files/129761/
Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1579
Reference: https://www.exploit-db.com/exploits/34511/
Reference: https://www.exploit-db.com/exploits/36039/
[i] Fixed in: 4.1.5
[!] Title: WordPress Slider Revolution Shell Upload
Reference: https://wpvulndb.com/vulnerabilities/7954
Reference: https://whatisgon.wordpress.com/2014/11/30/another-revslider-vulnerability/
Reference: https://www.rapid7.com/db/modules/exploit/unix/webapp/wp_revslider_upload_execute
Reference: https://www.exploit-db.com/exploits/35385/
[i] Fixed in: 3.0.96
[+] Name: woocommerce
| Latest version: 2.6.2
| Location: http://yourdomain.com/wp-content/plugins/woocommerce/
[!] Directory listing is enabled: http://yourdomain.com/wp-content/plugins/woocommerce/
[!] We could not determine a version so all vulnerabilities are printed out
[!] Title: WooCommerce 2.0.17 - hide-wc-extensions-message Parameter Reflected XSS
Reference: https://wpvulndb.com/vulnerabilities/6673
Reference: http://packetstormsecurity.com/files/123684/
Reference: http://www.securityfocus.com/bid/63228/
[i] Fixed in: 2.0.17
[!] Title: WooCommerce 2.0.12 - index.php calc_shipping_state Parameter XSS
Reference: https://wpvulndb.com/vulnerabilities/6674
Reference: http://packetstormsecurity.com/files/122465/
Reference: https://secunia.com/advisories/53930/
[i] Fixed in: 2.0.13
[!] Title: WooCommerce = 2.1.12 - Reflected Cross-Site Scripting (XSS)
Reference: https://wpvulndb.com/vulnerabilities/7575
Reference: http://seclists.org/fulldisclosure/2014/Sep/59
Reference: https://security.dxw.com/advisories/reflected-xss-in-woocommerce-excelling-ecommerce-allows-attackers-ability-to-do-almost-anything-an-admin-user-can-do/
[i] Fixed in: 2.2.3
[!] Title: WooCommerce = 2.2.2 - Reflected Cross-Site Scripting (XSS)
Reference: https://wpvulndb.com/vulnerabilities/7699
Reference: http://seclists.org/fulldisclosure/2014/Sep/59
Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6313
Reference: https://secunia.com/advisories/61377/
[i] Fixed in: 2.2.3
[!] Title: WooCommerce = 2.2.10 - Cross-Site Scripting (XSS)
Reference: https://wpvulndb.com/vulnerabilities/7801
Reference: http://seclists.org/fulldisclosure/2015/Feb/75
Reference: http://packetstormsecurity.com/files/130458/
Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2069
[i] Fixed in: 2.2.11
[!] Title: WooCommerce 2.3 - 2.3.5 - SQL Injection
Reference: https://wpvulndb.com/vulnerabilities/7846
Reference: http://www.wordfence.com/blog/2015/03/woocommerce-sql-injection-vulnerability/
[i] Fixed in: 2.3.6
[!] Title: WooCommerce 2.0.20-2.3.10 - Object Injection / XXE
Reference: https://wpvulndb.com/vulnerabilities/8039
Reference: https://blog.sucuri.net/2015/06/security-advisory-object-injection-vulnerability-in-woocommerce.html
[i] Fixed in: 2.3.11
[!] Title: WooCommerce = 2.4.8 - Authenticated Cross-Site Scripting (XSS)
Reference: https://wpvulndb.com/vulnerabilities/8242
Reference: http://blog.fortinet.com/post/fortiguard-labs-discloses-another-wordpress-woocommerce-plug-in-cross-site-scripting-vulnerability
[i] Fixed in: 2.4.9
[+] Name: yith-product-size-charts-for-woocommerce - v1.0.9
| Latest version: 1.0.9 (up to date)
| Location: http://yourdomain.com/wp-content/plugins/yith-product-size-charts-for-woocommerce/
| Readme: http://yourdomain.com/wp-content/plugins/yith-product-size-charts-for-woocommerce/README.txt
[!] Directory listing is enabled: http://yourdomain.com/wp-content/plugins/yith-product-size-charts-for-woocommerce/
[+] Name: yith-woocommerce-wishlist - v2.0.16
| Latest version: 2.0.16 (up to date)
| Location: http://yourdomain.com/wp-content/plugins/yith-woocommerce-wishlist/
| Readme: http://yourdomain.com/wp-content/plugins/yith-woocommerce-wishlist/README.txt
[!] Directory listing is enabled: http://yourdomain.com/wp-content/plugins/yith-woocommerce-wishlist/
[+] Enumerating all themes (may take a while and use a lot of system resources) ...
Time: 00:05:43 ========================================================================= (13184 / 13184) 100.00% Time: 00:05:43
[+] We found 2 themes:
[+] Name: shopkeeper - v1.6.6
| Location: http://yourdomain.com/wp-content/themes/shopkeeper/
| Style URL: http://yourdomain.com/wp-content/themes/shopkeeper/style.css
| Theme Name: Shopkeeper
| Theme URI: http://www.getbowtied.com/
| Description: Shopkeeper is a responsive, super-mobile-friendly theme for WordPress and WooCommerce.
| Author: Get Bowtied
| Author URI: http://www.getbowtied.com/
[+] Name: shopkeeper-child - v1.0
| Location: http://yourdomain.com/wp-content/themes/shopkeeper-child/
[!] Directory listing is enabled: http://yourdomain.com/wp-content/themes/shopkeeper-child/
| Style URL: http://yourdomain.com/wp-content/themes/shopkeeper-child/style.css
| Theme Name: Shopkeeper Child
| Theme URI: http://shopkeeper.getbowtied.com/
| Description: This is a child theme for Shopkeeper.
| Author: Get Bowtied
| Author URI: http: //www.getbowtied.com/
[+] Enumerating timthumb files ...
Time: 00:00:57 ========================================================================= (2539 / 2539) 100.00% Time: 00:00:57
[+] No timthumb files found
[+] Enumerating usernames ...
[+] We did not enumerate any usernames
[+] Finished: Mon Jul 4 14:17:46 2016
[+] Requests Done: 76791
[+] Memory used: 247.66 MB
[+] Elapsed time: 14:05:24
netto@talvisota ~/Downloads/wpscan $