Introducing WPScan - WordPress Security Scanner

After creating the WordPress Brute Force Tool last weekend, I decided to create a bigger project out of it, called WPScan.

WPScan is a black box WordPress Security Scanner written in Ruby which attempts to find known security weaknesses within WordPress installations. Its intended use it to be for security professionals or WordPress administrators to asses the security posture of their WordPress installations. The code base is Open Source and licensed under the GPLv3.

Features include:

Username enumeration
Weak password cracking (multithreaded)
Version enumeration
Vulnerability enumeration (based on version)
Plugin enumeration (todo)
Plugin vulnerability enumeration (based on version) (todo)
Other miscellaneous checks


**Please use the up to date instructions found here;

WPScan requires two non native Ruby gems, typhoeus and xml-simple. It should work on both Ruby 1.8.x and 1.9.x.

sudo apt-get install libcurl4-gnutls-dev
sudo gem install --user-install typhoeus
sudo gem install --user-install xml-simple

(I developed WPScan on Backtrack5 Gnome 32bit, if installing on another OS, you may not need the --user-install option when installing the non native gems)


WPScan will be hosted on Google Code GitHub at

You can download and start running WPScan ALPHA by checking out cloning the SVN trunk git trunk.
"svn checkout wpscan-read-only"
git clone

Example usage:

ruby wpscan.rb --url
ruby wpscan.rb --url --wordlist darkc0de.lst --threads 50
ruby wpscan.rb --url --wordlist darkc0de.lst --username admin

Contributions, feedback, comments are welcome.

Happy Hacking!