Breaking WordPress Through Plugin Vulnerabilities
From reconnaissance and enumeration to plugin abuse and remote code execution, this talk shows how attackers build momentum — and where defenders can stop them.
From reconnaissance and enumeration to plugin abuse and remote code execution, this talk shows how attackers build momentum — and where defenders can stop them.
Benjamin Franklin
What a pentest is, why it matters, and how attackers think in stages.
Network scanning, OSINT, and web enumeration to map the target.
Themes, plugins, version leaks, and where real-world exposure often starts.
How a weakness becomes code execution, compromise, and business impact.
A clear attacker workflow from discovery to evidence.
What students should remember, fix, and practise ethically.
A penetration test is legal, scoped, and permission-based.
It simulates attacker behaviour to see what can actually be reached.
The goal is not a list of bugs. The goal is demonstrable business risk.
Find what exists.
Identify doors and services.
Turn weakness into access.
Translate technical proof into risk.
HTTP surface
SSH access
TLS web app
host and service discovery
web traffic and abuse
local exploit lookup
Find exposed files, dashboards, backups, and login paths.
Collect emails, hosts, and subdomains from public sources.
Enrich the picture with modular intelligence and exposed-device search.
W3Techs reports WordPress is used by 42.2% of all websites and 59.6% of websites with a known CMS, which helps explain why plugin vulnerabilities remain such a valuable target for attackers.[web:11]
of all websites use WordPress.[web:11]
share among sites with a known CMS.[web:11]
of WordPress sites run version 6.[web:11]
Find an exposed plugin and identify the version.
Search CVEs, advisories, or Searchsploit for a matching weakness.
Use the vulnerable path, upload, or parameter to gain execution.
Dump data, take over the site, pivot, or prove business risk.
Remote command execution on the host.
Browser compromise or database abuse.
Unexpected admin access or workflow abuse.
Exploitation is not magic. It is usually the result of methodical recon, weak patching, and small mistakes chained together.
Recon is messy. Results are incomplete. Exploits fail. Payloads break. That is normal.
Repeating the loop builds pattern recognition, confidence, and better decision-making under uncertainty.
Networks, enumeration, WordPress plugins, and exploit chains all matter — but the lasting skill is disciplined thinking and legal, responsible practice.