Skip to content

DeConfigro is a tool that scans WordPress websites for the WordPress Setup Config Vulnerability. If exposed, this page indicates an incomplete installation and can be exploited, posing a security risk.

Notifications You must be signed in to change notification settings

Nuknov/DeConfigro

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

9 Commits
Β 
Β 
Β 
Β 

Repository files navigation

DeConfigro -- WordPress Vulnerability Scanner

Version License Built by Nuknov Built by AnonKryptiQuz

DeConfigro is a lightweight and powerful tool designed to scan websites for a common WordPress vulnerabilities involving the wp-admin/setup-config.php?step=1 page.

This page is part of the WordPress installation process and, if left exposed, can be a security risk. The tool checks if the page is accessible, indicating an incomplete WordPress installation that could be exploited.

Bash-Based. Fast. Efficient.
Built for security researchers, penetration testers, and bug bounty hunters who need to identify WordPress misconfigurations at scale.


🧩 What DeConfigro Does

  • Detects exposed WordPress setup configuration pages
  • Scans single URLs or bulk targets from file
  • Provides color-coded feedback for vulnerable endpoints
  • Saves vulnerable URLs to output file
  • Features auto-completion for file paths
  • Runs entirely in bash with minimal dependencies
  • Performs HTTP status checks to confirm vulnerabilities

Designed for efficient reconnaissance and vulnerability assessment in authorized security testing.

* This tool is for educational and authorized testing purposes only. See disclaimer below.


πŸ›°οΈ Tech Stack

  • Bash Shell – Cross-platform shell scripting
  • Curl – HTTP request handling
  • Auto-Completion – Enhanced user experience
  • Color-Coded Output – Clear visual feedback
  • File-Based Scanning – Bulk target processing

⚑ Features

Feature Details
Vulnerability Detection Identifies exposed WordPress setup configuration pages
Single URL Scanning Test individual targets quickly
Bulk Scanning Process multiple URLs from file
Auto-Completion File path completion for improved workflow
Detailed Output Color-coded feedback for vulnerable URLs
Save Results Export vulnerable URLs to file for documentation
HTTP Status Validation Confirms page accessibility before flagging
Lightweight Minimal dependencies, runs on any Unix-like system

πŸ› οΈ Installation

Quick Setup

  1. Clone the repository

    git clone https://github.com/nuknov/DeConfigro.git
    cd DeConfigro
  2. Give executable permission to the script

    chmod +x DeConfigro.sh
  3. Verify dependencies

    # Check if curl is installed
    curl --version
    
    # If not installed:
    # Ubuntu/Debian: sudo apt install curl
    # macOS: brew install curl

πŸ“‚ Usage

Basic Usage

  1. Run the tool:

    ./DeConfigro.sh

    OR

    bash DeConfigro.sh

    Note: The ./ method is preferred if the script has been made executable with chmod +x, while bash can be used if you prefer to run the script through the Bash shell explicitly.

  2. Follow the prompts:

    • Choose single URL or bulk scan mode
    • Enter target URL(s) or file path
    • Review scan results
  3. After the scan:

    • Vulnerable URLs will be displayed in color-coded output
    • Option to save results to a file for documentation

Example Workflow

$ ./DeConfigro.sh

[DeConfigro - WordPress Configuration Scanner]

Select scanning mode:
1. Single URL
2. Bulk scan from file

Enter choice: 2

Enter file path: targets.txt
[Auto-completion enabled]

Scanning targets...
βœ… https://example1.com - VULNERABLE
❌ https://example2.com - Not Vulnerable
βœ… https://example3.com - VULNERABLE

Save results to file? (y/n): y
Results saved to: vulnerable_sites.txt

Vulnerability Details

What is the wp-admin/setup-config.php vulnerability?

β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”
β”‚  WORDPRESS SETUP CONFIGURATION EXPOSURE          β”‚
β”œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€
β”‚                                                  β”‚
β”‚  Vulnerable Endpoint:                            β”‚
β”‚  /wp-admin/setup-config.php?step=1               β”‚
β”‚                                                  β”‚
β”‚  Risk Level: MEDIUM to HIGH                      β”‚
β”‚                                                  β”‚
β”‚  Attack Vector:                                  β”‚
β”‚  β€’ Incomplete WordPress installation             β”‚
β”‚  β€’ Setup page left publicly accessible           β”‚
β”‚  β€’ Allows database configuration exposure        β”‚
β”‚  β€’ Potential for database credential theft       β”‚
β”‚                                                  β”‚
β”‚  Impact:                                         β”‚
β”‚  β€’ Attacker can complete installation            β”‚
β”‚  β€’ Database takeover possible                    β”‚
β”‚  β€’ Full site compromise                          β”‚
β”‚                                                  β”‚
β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜

How DeConfigro Detects It

# Detection Method:
1. Send HTTP GET request to target + /wp-admin/setup-config.php?step=1
2. Check HTTP status code (200 = vulnerable)
3. Verify page content for WordPress setup indicators
4. Flag as vulnerable if exposed
5. Save to results file

βš™οΈ How It Works

DeConfigro uses bash scripting and curl to:

  1. Accept target input (single URL or file of URLs)
  2. Construct vulnerable endpoint by appending /wp-admin/setup-config.php?step=1
  3. Send HTTP requests using curl
  4. Analyze responses for exposure indicators
  5. Display color-coded results to user
  6. Save vulnerable targets to output file

βœ… Runs entirely locally
βœ… No external dependencies beyond curl
βœ… Fully open source


πŸ”§ Requirements

Requirement Details
Operating System Linux, macOS, WSL for Windows
Shell Bash (pre-installed on most Unix systems)
HTTP Client curl (for making HTTP requests)
Permissions Execute permission on script
Network Internet connection for remote scanning

🎨 Output Example

β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”
β”‚  DeConfigro - Scan Results                    β”‚
β”œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€
β”‚                                                β”‚
β”‚  βœ… https://site1.com - VULNERABLE             β”‚
β”‚     β†’ /wp-admin/setup-config.php?step=1        β”‚
β”‚                                                β”‚
β”‚  ❌ https://site2.com - Not Vulnerable         β”‚
β”‚                                                β”‚
β”‚  βœ… https://site3.com - VULNERABLE             β”‚
β”‚     β†’ /wp-admin/setup-config.php?step=1        β”‚
β”‚                                                β”‚
β”‚  πŸ“Š Summary:                                   β”‚
β”‚     Total Scanned: 3                           β”‚
β”‚     Vulnerable: 2                              β”‚
β”‚     Secure: 1                                  β”‚
β”‚                                                β”‚
β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜

⚠️ Disclaimer

IMPORTANT: This tool is for educational and authorized testing purposes ONLY.

  • You MUST have explicit permission from the website owner before scanning
  • This tool is designed for authorized security assessments and bug bounty programs
  • The authors are NOT responsible for any misuse or unauthorized scanning
  • Unauthorized scanning may be illegal in your jurisdiction

Legal Considerations:

  • Only scan websites you own or have written authorization to test
  • Respect responsible disclosure guidelines
  • Comply with bug bounty program rules
  • Follow all applicable laws and regulations

Ethical Usage:

  • Use for vulnerability research and security improvement only
  • Report findings to website owners responsibly
  • Do not exploit discovered vulnerabilities
  • Maintain confidentiality of discovered issues

Always operate within legal boundaries and ethical guidelines.


🧠 Use Cases

  • Bug bounty hunting on authorized programs
  • Security assessments with proper authorization
  • WordPress security audits for clients
  • Penetration testing in controlled environments
  • Security research on owned infrastructure
  • Red team exercises with documented scope
  • Vulnerability disclosure programs
  • Educational security training

Ideal for security professionals and researchers conducting authorized WordPress security assessments.


Authors

Created by:

With great power comes great responsibility. Scan ethically. Always get permission. Respect boundaries.

About

DeConfigro is a tool that scans WordPress websites for the WordPress Setup Config Vulnerability. If exposed, this page indicates an incomplete installation and can be exploited, posing a security risk.

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Contributors 2

  •  
  •  

Languages