Enumerate Wordpress Users (wpscan --url https://stea-web.com/ --enumerate u --random-user-agent --force --max-scan-duration 60)
URL: https://stea-web.com/ [2606:4700:3035::6815:1d96]
Started: Mon Dec 8 01:46:37 2025
Interesting Finding(s):
Headers
| Interesting Entries:
| - Speculation-Rules: "/cdn-cgi/speculation"
| - Report-To: {"group":"cf-nel","max_age":604800,"endpoints":[{"url":"https://a.nel.cloudflare.com/report/v4?s=tS%2BbZAqNQJgXp8YnXN0vgD1cgXmyDbM04Z7TXeIOuhcrv575sBLz5ljwbja1jt2ESfdZ%2FwZ7k0LmFi7zAAYIbpRNZqTBnUgp6oZtdg%3D%3D"}]}
| - Server: cloudflare
| - cf-cache-status: DYNAMIC
| - Nel: {"report_to":"cf-nel","success_fraction":0.0,"max_age":604800}
| - CF-RAY: 9aab560f0c37c9f5-LAX
| - alt-svc: h3=":443"; ma=86400
| Found By: Headers (Passive Detection)
| Confidence: 100%
robots.txt found: https://stea-web.com/robots.txt
| Found By: Robots Txt (Aggressive Detection)
| Confidence: 100%
This site has 'Must Use Plugins': https://stea-web.com/wp-content/mu-plugins/
| Found By: Direct Access (Aggressive Detection)
| Confidence: 80%
| Reference: http://codex.wordpress.org/Must_Use_Plugins
The external WP-Cron seems to be enabled: https://stea-web.com/wp-cron.php
| Found By: Direct Access (Aggressive Detection)
| Confidence: 60%
| References:
| - https://www.iplocation.net/defend-wordpress-from-ddos
| - https://github.com/wpscanteam/wpscan/issues/1299
WordPress version 6.9 identified (Latest, released on 2025-12-02).
| Found By: Rss Generator (Passive Detection)
| - https://stea-web.com/feed/, <generator>https://wordpress.org/?v=6.9</generator>
| - https://stea-web.com/comments/feed/, <generator>https://wordpress.org/?v=6.9</generator>
The main theme could not be detected.
Enumerating Users (via Passive and Aggressive Methods)
Brute Forcing Author IDs -: |=================================================|
User(s) Identified:
Vasile BOULAY
| Found By: Rss Generator (Passive Detection)
| Confirmed By: Rss Generator (Aggressive Detection)
steaadmin123
| Found By: Oembed API - Author URL (Aggressive Detection)
| - https://stea-web.com/wp-json/oembed/1.0/embed?url=https://stea-web.com/&format=json
| Confirmed By: Author Id Brute Forcing - Author Pattern (Aggressive Detection)
cathy
| Found By: Author Id Brute Forcing - Author Pattern (Aggressive Detection)
No WPScan API Token given, as a result vulnerability data has not been output.
You can get a free API token with 25 daily requests by registering at https://wpscan.com/register
Finished: Mon Dec 8 01:47:06 2025
Requests Done: 58
Cached Requests: 8
Data Sent: 14.83 KB
Data Received: 3.991 MB
Memory used: 186.461 MB
Elapsed time: 00:00:29
Color Scheme
-
Target
stea-web.com
-
Scan method
Enumerate Wordpress Users
-
Run command
wpscan --url https://stea-web.com/ --enumerate u --random-user-agent --force --max-scan-duration 60
-
Scan time
-
Quick report
-
Scan date
08 Dec 2025 04:47
-
Copy scan report
-
Download report
-
Remove scan result
-
Total scans
We use cookies to ensure you get the best experience on our website.
Cookie policy