WordPress – Documentation File

Description

During the scan, some possible Documentation Files were detected, and, are probably exposed to others as well. That allows an attacker to view and even and download these files.

An attacker could access this file and use the information it contains to perform reconnaissance actions against the website’s infrastructure by using the sensitive data the website might hold.

Documentation Files might contain sensitive, valid information about the website’s infrastructure.
It can also disclose other sensitive data related to it. Attackers are trying to locate those files in order to perform reconnaissance actions.

Recommendation

To prevent this vulnerability, make sure to restrict access to these files, so that users without permission can’t access them, or, you can remove them completely from the website.

References

https://wordpress.org/support/

< Return to all Vulnerabilities

Man-In-The-Middle Attacks

Do you know these people who just push themselves into conversations?That’s Man-In-The-Middle Attacks. And from a wider angle, Man-In-The-Middle Attacks, or MITM, are built around

Read More »