Crate wordpress_vulnerable_scanner

Crate wordpress_vulnerable_scanner 

Source
Expand description

WordPress Vulnerable Scanner

A tool for detecting known security vulnerabilities in WordPress installations.

§Features

  • Scans WordPress sites to detect core version, plugins, and themes
  • Queries WPVulnerability API for known CVEs
  • Supports multiple input modes: URL, direct component list, or JSON manifest
  • Outputs results in human-readable or JSON format

§Example

use wordpress_vulnerable_scanner::{Scanner, Analyzer};

#[tokio::main]
async fn main() -> Result<(), Box<dyn std::error::Error>> {
    let scanner = Scanner::new("https://example.com")?;
    let scan_result = scanner.scan().await?;

    let analyzer = Analyzer::new()?;
    let analysis = analyzer.analyze(&scan_result).await;

    println!("Found {} vulnerabilities", analysis.summary.total);
    Ok(())
}

Re-exports§

pub use analyze::Analysis;
pub use analyze::Analyzer;
pub use analyze::ComponentVulnerabilities;
pub use analyze::VulnerabilitySummary;
pub use error::Error;
pub use error::Result;
pub use output::OutputConfig;
pub use output::OutputFormat;
pub use output::output_analysis;
pub use scanner::ComponentInfo;
pub use scanner::ComponentType;
pub use scanner::ScanResult;
pub use scanner::Scanner;
pub use vulnerability::Severity;
pub use vulnerability::Vulnerability;
pub use vulnerability::VulnerabilityClient;
pub use vulnerability::VulnerabilityReport;

Modules§

analyze
Analysis logic for vulnerability scanning
error
Error types for WordPress vulnerability scanner
output
Output formatting for vulnerability scan results
scanner
WordPress website scanner
vulnerability
Vulnerability types and WPVulnerability API client