WordPress – Documentation File


During the scan, some possible Documentation Files were detected, and, are probably exposed to others as well. That allows an attacker to view and even and download these files.

An attacker could access this file and use the information it contains to perform reconnaissance actions against the website’s infrastructure by using the sensitive data the website might hold.

Documentation Files might contain sensitive, valid information about the website’s infrastructure.
It can also disclose other sensitive data related to it. Attackers are trying to locate those files in order to perform reconnaissance actions.


To prevent this vulnerability, make sure to restrict access to these files, so that users without permission can’t access them, or, you can remove them completely from the website.



< Return to all Vulnerabilities

What is Kayran

Kayran scanner is helping all businesses, both SMBs and enterprises, to test their online assets and products for over 30,000+ vulnerabilities.Kayran’s mission is to make

Read More »

Explaining API

We’ve talked about API’s Vulnerability in here, but i feel like there’s much more to talk about and explain since this is a big and

Read More »

Exposing the GIT

Let’s start with defining the meaning of GIT. GIT – is an open-source system which we use as a tool to store data and information

Read More »