WordPress Users Disclosure [500$ Bounty]

Mohammad Mohsin
3 min readMay 1, 2022
WordPress User Disclosure

This is my 21st blog on web application security penetration testing. In this blog I will explain about WordPress Users Disclosure Vulnerability.

In my last blog, I have explained about Insufficient Logging and Monitoring Hope everyone liked it. If you haven’t read it yet please follow along.

In this blog, I will explain about How I was able to enumerate WordPress users and got 500$ bounty on a private program. To maintain confidentiality let’s consider the domain name is redacted.com running WordPress on it. Below is the step by step POC:

  1. Identify whether website is running WordPress on it or not. I have used Wappalyzer to identify used technologies. You can install this extension into chrome browser.
WordPress Detection

2. Method 1: Try to access below endpoint to enumerate WordPress users. If it is protected then you will see custom error like below:

https://www.redacted.com/wp-json/wp/v2/users/

Method 1 to Access WordPress Users

3. Let’s try Method2: You can install Wpscan on kali-linux and run below command to enumerate WordPress users from site. Following usernames are successfully enumerated using wpscan (WordPress Scanning Tool).

Command: wpscan --url https://www.redacted.com --enumerate u1–100

WordPress Enumerated Users

Impact:

Successful username enumeration leads to brute force attack or password guessing attack which further leads to account takeover.

WordPress Login Page to Brute Force Password

Recommendation:

Use this code which will hide the users list and give 404 as the result, while rest of the api calls keep running as they were.

Code for Prevention

References:

Hackerone Report:

Please do like and follow for more reads!

Thanks!

--

--

Mohammad Mohsin

Director - OLF Infotech Pvt. Ltd. Ethical Hacker, Vulnerability Assessment and Penetration Tester, Bug Hunter, Security Researcher, Optimistic, Philanthropist.