Expand description
WordPress Vulnerable Scanner
A tool for detecting known security vulnerabilities in WordPress installations.
§Features
- Scans WordPress sites to detect core version, plugins, and themes
- Queries WPVulnerability API for known CVEs
- Supports multiple input modes: URL, direct component list, or JSON manifest
- Outputs results in human-readable or JSON format
§Example
use wordpress_vulnerable_scanner::{Scanner, Analyzer};
#[tokio::main]
async fn main() -> Result<(), Box<dyn std::error::Error>> {
let scanner = Scanner::new("https://example.com")?;
let scan_result = scanner.scan().await?;
let analyzer = Analyzer::new()?;
let analysis = analyzer.analyze(&scan_result).await;
println!("Found {} vulnerabilities", analysis.summary.total);
Ok(())
}Re-exports§
pub use analyze::Analysis;pub use analyze::Analyzer;pub use analyze::ComponentVulnerabilities;pub use analyze::VulnerabilitySummary;pub use error::Error;pub use error::Result;pub use output::OutputConfig;pub use output::OutputFormat;pub use output::output_analysis;pub use scanner::ComponentInfo;pub use scanner::ComponentType;pub use scanner::ScanResult;pub use scanner::Scanner;pub use vulnerability::Severity;pub use vulnerability::Vulnerability;pub use vulnerability::VulnerabilityClient;pub use vulnerability::VulnerabilityReport;
Modules§
- analyze
- Analysis logic for vulnerability scanning
- error
- Error types for WordPress vulnerability scanner
- output
- Output formatting for vulnerability scan results
- scanner
- WordPress website scanner
- vulnerability
- Vulnerability types and WPVulnerability API client