Membership level: Free member
Enumerate Wordpress Users (wpscan --url https://charlinetoussaint.be/ --enumerate u --random-user-agent --force --max-scan-duration 60)
URL: https://charlinetoussaint.be/ [2a01:4f8:1c1c:4f52::1]
Started: Fri Mar 28 12:59:39 2025


Fingerprinting the version -: |================================================|
 The WordPress version could not be detected.

WordPress theme in use: common
 | Location: https://charlinetoussaint.be/app/site/themes/common/
 | Latest Version: 1.0.6
 | Last Updated: 2024-11-26T00:00:00.000Z
 | Style URL: https://charlinetoussaint.be/app/site/themes/common/style.css
 |
 | Found By: Urls In Homepage (Passive Detection)
 | Confirmed By: Urls In 404 Page (Passive Detection)
 |
 | The version could not be determined.

Enumerating Users (via Passive and Aggressive Methods)

 Brute Forcing Author IDs -: |=================================================|

 No Users Found.

 No WPScan API Token given, as a result vulnerability data has not been output.
 You can get a free API token with 25 daily requests by registering at https://wpscan.com/register

Finished: Fri Mar 28 13:00:34 2025
Requests Done: 780
Cached Requests: 9
Data Sent: 237.844 KB
Data Received: 529.963 KB
Memory used: 182.902 MB
Elapsed time: 00:00:55
Color Scheme
Target
charlinetoussaint.be
Scan method
Enumerate Wordpress Users
Run command
wpscan --url https://charlinetoussaint.be/ --enumerate u --random-user-agent --force --max-scan-duration 60
Scan time
55s
Quick report
Order full scan ($19/one time)
Scan date
28 Mar 2025 16:00
Copy scan report
Download report
Remove scan result
$
Some firewalls blocks vulnerability scanners. For get true positive results add wpscan.online IP addresses (208.76.253.232-208.76.253.239 or CIDR 208.76.253.232/29 ) to the whitelist
[scan_method]
Visibility:
Scan method:
Max Scan duration: