Information Disclosure: WordPress RDF Feed Users Exposed¶
Identifier:
wordpress_rdf_feed_user_exposed
Scanner(s) Support¶
GraphQL Scanner | REST Scanner | WebApp Scanner |
---|---|---|
Description¶
The issue occurs when the WordPress RDF feed at /feed/rdf/
is accessible without authentication, exposing post metadata including author details. This allows attackers to enumerate users, aiding in reconnaissance and enabling targeted attacks.
Configuration¶
Example¶
Example configuration:
---
security_tests:
wordpress_rdf_feed_user_exposed:
assets_allowed:
- REST
- GRAPHQL
- WEBAPP
skip: false
Reference¶
assets_allowed
¶
Type : List[AssetType]
*
List of assets that this check will cover.
skip
¶
Type : boolean
Skip the test if true.