WPVulnDB CMD is a command-line vulnerability reporter designed specifically for WordPress security assessment. This tool combines the power of WP-CLI and WPVulnDB to provide server administrators with a quick and efficient way to identify vulnerable plugins and themes in WordPress installations.
Project Overview
This tool addresses the common challenge faced by server administrators who need to quickly assess the security posture of WordPress installations. Instead of running resource-intensive tools like WPScan that perform unnecessary brute-force operations, WPVulnDB CMD provides a streamlined approach by leveraging existing WordPress management tools.
Key Features
🚀 Efficient Vulnerability Detection
WP-CLI Integration: Leverages WP-CLI for WordPress instance information gathering
WPVulnDB API: Uses WPVulnDB API for comprehensive vulnerability data
Quick Scanning: Fast vulnerability assessment without unnecessary operations
Server Admin Focused: Designed specifically for server administrators
🔧 Command-Line Interface
Simple Usage: Easy-to-use command-line interface
Flexible Options: Configurable scanning options
Vulnerability-Only Mode: Option to show only vulnerable items
Path-Based Scanning: Direct path specification for WordPress installations
📊 Comprehensive Reporting
Plugin Vulnerability Detection: Identifies vulnerable plugins and their versions
Theme Vulnerability Detection: Scans for vulnerable themes
Version Matching: Accurate version-based vulnerability identification
Detailed Output: Clear and actionable vulnerability information
usage: wpscancli.py [-h] --path PATH [--vulnonly]This program is used to run a quick wordpress scan via wpscan api. This
command depends on wp-cli
optional arguments:
-h, --help show this help message and exit
--path PATH Provide URL
--vulnonly Only List vulnerable Items