{"id":2871,"date":"2014-06-04T13:38:44","date_gmt":"2014-06-04T12:38:44","guid":{"rendered":"https:\/\/dn-www.azurewebsites.net\/2014\/06\/04\/cmsmap-a-simple-cms-vulnerability-scanner\/"},"modified":"2024-02-06T13:12:12","modified_gmt":"2024-02-06T13:12:12","slug":"cmsmap-a-simple-cms-vulnerability-scanner","status":"publish","type":"post","link":"https:\/\/dionach.com\/nl\/cmsmap-a-simple-cms-vulnerability-scanner\/","title":{"rendered":"CMSmap \u2013 A simple CMS vulnerability Scanner"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"2871\" class=\"elementor elementor-2871\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-405f7504 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"405f7504\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4a8c75b3\" data-id=\"4a8c75b3\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-251d7074 elementor-widget elementor-widget-text-editor\" data-id=\"251d7074\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"margin: 0.5em 0px; font-family: frutiger-lt-45-light1, Verdana, Geneva, Arial, helvetica, sans-serif; font-size: 14px; line-height: 24px; background-color: #ffffff;\">CMSmap is a simple Python open source CMS scanner that automates the process of detecting security flaws of the most popular CMSs. The main purpose of CMSmap is to integrate common vulnerabilities for different types of CMSs in a single tool. At the moment of writing, CMSmap supports WordPress, Joomla and Drupal.<\/p><p style=\"margin: 0.5em 0px; font-family: frutiger-lt-45-light1, Verdana, Geneva, Arial, helvetica, sans-serif; font-size: 14px; line-height: 24px; background-color: #ffffff;\">This tool saves time during a penetration test when you come across a CMS. CMSmap runs a variety of tests in order to highlight plenty of possible misconfigurations and vulnerabilities that the target website may suffer.<\/p><p style=\"margin: 0.5em 0px; font-family: frutiger-lt-45-light1, Verdana, Geneva, Arial, helvetica, sans-serif; font-size: 14px; line-height: 24px; background-color: #ffffff;\">Please note that this project is an early stage. As such, you might find bugs, flaws or malfunctions. In short, use it at your own risk.<\/p><p style=\"margin: 0.5em 0px; font-family: frutiger-lt-45-light1, Verdana, Geneva, Arial, helvetica, sans-serif; font-size: 14px; line-height: 24px; background-color: #ffffff;\">The purpose of this blog entry is to provide an overview about the results, functions and features that CMSmap does when it is executed. There are a number of tools that scan CMSs in order to find vulnerabilities, such as WPscan for WordPress and JoomlaScan for Joomla. The goal of CMSmap is not to replicate these tools, but to combine scanning of different CMSs into one single tool; you could say that I was inspired by the other tools.<\/p><p style=\"margin: 0.5em 0px; font-family: frutiger-lt-45-light1, Verdana, Geneva, Arial, helvetica, sans-serif; font-size: 14px; line-height: 24px; background-color: #ffffff;\">Let\u2019s look at the features that at the moment CMSmap supports.<\/p><p style=\"margin: 0.5em 0px; font-family: frutiger-lt-45-light1, Verdana, Geneva, Arial, helvetica, sans-serif; font-size: 14px; line-height: 24px; background-color: #ffffff;\">First of all, CMSmap detects the CMS type of the target website. So for example, if the target website is running a WordPress installation, CMSmap will run all scans tailored for WordPress.<\/p><p style=\"margin: 0.5em 0px; font-family: frutiger-lt-45-light1, Verdana, Geneva, Arial, helvetica, sans-serif; font-size: 14px; line-height: 24px; background-color: #ffffff;\">CMSmap comes with a list of default WordPress, Joomla and Drupal plugins. You don\u2019t need to find a list of plugins for the corresponding CMS type. This is quite useful for Drupal and Joomla, since their websites don\u2019t provide a list of vulnerable plugins in a such nice format which could be exported in a text file and use it. However, if the user wants to use a specific list rather than the default one, they can easily edit one of the CMSmap default files.<\/p><p style=\"margin: 0.5em 0px; font-family: frutiger-lt-45-light1, Verdana, Geneva, Arial, helvetica, sans-serif; font-size: 14px; line-height: 24px; background-color: #ffffff;\">For each CMS type, CMSmap run a bunch of tests, from the simplest ones such as detection of CMS version, theme and default files to the more time consuming ones such as detection of plugins.<\/p><p style=\"margin: 0.5em 0px; font-family: frutiger-lt-45-light1, Verdana, Geneva, Arial, helvetica, sans-serif; font-size: 14px; line-height: 24px; background-color: #ffffff;\">CMSmap is a multithreading tool, and by default is set to 5 threads. This is to reduce the likelihood of causing denial of service on the target website. However, there is an option that allows a user to increase the number of threads, and thus the speed of scanning.<\/p><p style=\"margin: 0.5em 0px; font-family: frutiger-lt-45-light1, Verdana, Geneva, Arial, helvetica, sans-serif; font-size: 14px; line-height: 24px; background-color: #ffffff;\">CMSmap is meant to be easy to use, in sense that the only mandatory option is the target URL. However, CMSmap includes a brute-forcing module as well. If the user wants to run a brute-forcing attack, password\/username files must be provided along with the URL. By default, Drupal is the only CMS that will lockout user accounts after a certain number of failed attempts. This means that unless a specific security plugin is installed you are pretty much free to brute force WordPress and Joomla login forms.<\/p><p style=\"margin: 0.5em 0px; font-family: frutiger-lt-45-light1, Verdana, Geneva, Arial, helvetica, sans-serif; font-size: 14px; line-height: 24px; background-color: #ffffff;\">The core of CMSmap is to detect vulnerable plugins and provide a list of potential exploits by querying the Exploit Database website (<a style=\"color: #0066b6; text-decoration: none;\" href=\"https:\/\/www.exploit-db.com\/\">www.exploit-db.com<\/a>). This is because, unless a really old version of the core CMS is installed, the easiest way to take over a CMS website is by exploiting a vulnerable plugin (as discussed in a previous article\u00a0<a style=\"color: #0066b6; text-decoration: none;\" href=\"https:\/\/www.dionach.com\/cmsmap-a-simple-cms-vulnerability-scanner\/\">here<\/a>). In order to do that CMSmap identifies plugins by scanning the web directory, and then for each plugin it queries the Exploit Database. In this way, whenever a new exploit is published on the Exploit Database, CMSmap would be able to report it.<\/p><p style=\"margin: 0.5em 0px; font-family: frutiger-lt-45-light1, Verdana, Geneva, Arial, helvetica, sans-serif; font-size: 14px; line-height: 24px; background-color: #ffffff;\">Now, let\u2019s have a look how a simple scan against a WordPress site looks like:<\/p><p style=\"margin: 0.5em 0px; font-family: frutiger-lt-45-light1, Verdana, Geneva, Arial, helvetica, sans-serif; font-size: 14px; line-height: 24px; background-color: #ffffff;\"><img decoding=\"async\" style=\"border: 0px; max-width: 100%; width: 583px; height: 359px;\" src=\"\/wp-content\/uploads\/files\/cms1.jpg\" \/><\/p><p style=\"margin: 0.5em 0px; font-family: frutiger-lt-45-light1, Verdana, Geneva, Arial, helvetica, sans-serif; font-size: 14px; line-height: 24px; background-color: #ffffff;\">From the picture above, we can see that CMSmap has identified a temp configuration file, probably generated by text editor Nano, available anonymously on the website. These files usually contain clear text credentials to the login page of the website.<\/p><p style=\"margin: 0.5em 0px; font-family: frutiger-lt-45-light1, Verdana, Geneva, Arial, helvetica, sans-serif; font-size: 14px; line-height: 24px; background-color: #ffffff;\">One feature of CMSmap is the brute-forcing module during a scan. When a valid username is detected via a vulnerability then CMSmap by default will try short (5 attempt brute-force attack. This comes in handy when at least one is user is using a very weak password.<\/p><p style=\"margin: 0.5em 0px; font-family: frutiger-lt-45-light1, Verdana, Geneva, Arial, helvetica, sans-serif; font-size: 14px; line-height: 24px; background-color: #ffffff;\">Other feature of CMSmap brute-forcing module is self-explained in the picture below:<\/p><p style=\"margin: 0.5em 0px; font-family: frutiger-lt-45-light1, Verdana, Geneva, Arial, helvetica, sans-serif; font-size: 14px; line-height: 24px; background-color: #ffffff;\"><img decoding=\"async\" style=\"border: 0px; max-width: 100%; width: 658px; height: 202px;\" src=\"\/wp-content\/uploads\/files\/cms2.jpg\" \/><\/p><p style=\"margin: 0.5em 0px; font-family: frutiger-lt-45-light1, Verdana, Geneva, Arial, helvetica, sans-serif; font-size: 14px; line-height: 24px; background-color: #ffffff;\">Whenever CMSmap identifies valid credentials for a user with permissions to upload a plugin, (most likely an admin), CMSmap will upload a plugin which contains a web shell. It is possible to view the CMSmap WordPress plugin in the list of installed plugins:<\/p><p style=\"margin: 0.5em 0px; font-family: frutiger-lt-45-light1, Verdana, Geneva, Arial, helvetica, sans-serif; font-size: 14px; line-height: 24px; background-color: #ffffff;\"><img decoding=\"async\" style=\"border: 0px; max-width: 100%; width: 912px; height: 356px;\" src=\"\/wp-content\/uploads\/files\/cms3.jpg\" \/><\/p><p style=\"margin: 0.5em 0px; font-family: frutiger-lt-45-light1, Verdana, Geneva, Arial, helvetica, sans-serif; font-size: 14px; line-height: 24px; background-color: #ffffff;\">In addition to having valid credentials, at this point the attacker accessing the web shell is able to execute operating system commands and attempts further compromises.<\/p><p style=\"margin: 0.5em 0px; font-family: frutiger-lt-45-light1, Verdana, Geneva, Arial, helvetica, sans-serif; font-size: 14px; line-height: 24px; background-color: #ffffff;\"><img decoding=\"async\" style=\"border: 0px; max-width: 100%; width: 785px; height: 404px;\" src=\"\/wp-content\/uploads\/files\/cms4.jpg\" \/><\/p><p style=\"margin: 0.5em 0px; font-family: frutiger-lt-45-light1, Verdana, Geneva, Arial, helvetica, sans-serif; font-size: 14px; line-height: 24px; background-color: #ffffff;\">CMSmap comes with web shells for WordPress, Joomla and Drupal. In case CMSmap is not able to upload them automatically, a user can do it manually.<\/p><p style=\"margin: 0.5em 0px; font-family: frutiger-lt-45-light1, Verdana, Geneva, Arial, helvetica, sans-serif; font-size: 14px; line-height: 24px; background-color: #ffffff;\">Finally, CMSmap supports offline brute force attack of WordPress and Joomla password hashes. via\u00a0<a style=\"color: #0066b6; text-decoration: none;\" href=\"https:\/\/hashcat.net\/\">HashCAT<\/a>\u00a0which could be useful to see if users, including admins, are using weak passwords.<\/p><p style=\"margin: 0.5em 0px; font-family: frutiger-lt-45-light1, Verdana, Geneva, Arial, helvetica, sans-serif; font-size: 14px; line-height: 24px; background-color: #ffffff;\">This project is ongoing so please remember to run the update option whenever you have the intention to use it. The project is hosted on GitHub and you can easily install it by cloning the repository:<\/p><pre style=\"margin-top: 0.5em; margin-bottom: 0.5em; font-family: 'Courier New', 'DejaVu Sans Mono', monospace, sans-serif; font-size: 14px; line-height: 1.5em; white-space: pre-wrap; word-wrap: break-word; background-color: #ffffff;\">git clone https:\/\/github.com\/dionach\/CMSmap<\/pre><p style=\"margin: 0.5em 0px; font-family: frutiger-lt-45-light1, Verdana, Geneva, Arial, helvetica, sans-serif; font-size: 14px; line-height: 24px; background-color: #ffffff;\">For a more comprehensive list of all features supported by CMSmap you can read the CHANGELOG.txt file.<\/p><p style=\"margin: 0.5em 0px; font-family: frutiger-lt-45-light1, Verdana, Geneva, Arial, helvetica, sans-serif; font-size: 14px; line-height: 24px; background-color: #ffffff;\">Hopefully you will find this tool quite handy and save time when you face a CMS during a penetration test.<\/p><p style=\"margin: 0.5em 0px; font-family: frutiger-lt-45-light1, Verdana, Geneva, Arial, helvetica, sans-serif; font-size: 14px; line-height: 24px; background-color: #ffffff;\">\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>CMSmap is a simple Python open source CMS scanner that automates the process of detecting security flaws of the most popular CMSs. The main purpose of CMSmap is to integrate common vulnerabilities for different types of CMSs in a single tool. At the moment of writing, CMSmap supports WordPress, Joomla and Drupal. This tool saves [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"content-type":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1],"tags":[214,207],"class_list":["post-2871","post","type-post","status-publish","format-standard","hentry","category-researchblog","tag-tools","tag-web_applications","wpbf-post"],"contentshake_article_id":"","yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>CMSmap \u2013 A simple CMS vulnerability Scanner<\/title>\n<meta name=\"description\" content=\"CMSmap is a simple Python open source CMS scanner that automates the process of detecting security flaws of the most popular CMSs. The main purpose of\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/dionach.com\/nl\/cmsmap-a-simple-cms-vulnerability-scanner\/\" \/>\n<meta property=\"og:locale\" content=\"nl_NL\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CMSmap \u2013 A simple CMS vulnerability Scanner\" \/>\n<meta property=\"og:description\" content=\"CMSmap is a simple Python open source CMS scanner that automates the process of detecting security flaws of the most popular CMSs. The main purpose of\" \/>\n<meta property=\"og:url\" content=\"https:\/\/dionach.com\/nl\/cmsmap-a-simple-cms-vulnerability-scanner\/\" \/>\n<meta property=\"og:site_name\" content=\"Dionach\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/dionachcyber\" \/>\n<meta property=\"article:published_time\" content=\"2014-06-04T12:38:44+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-02-06T13:12:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2025\/02\/cropped-Dionach-vertical-col-yel-nomios-black-1.jpg?fit=512%2C512&ssl=1\" \/>\n\t<meta property=\"og:image:width\" content=\"512\" \/>\n\t<meta property=\"og:image:height\" content=\"512\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Dionach Admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@dionachcyber\" \/>\n<meta name=\"twitter:site\" content=\"@dionachcyber\" \/>\n<meta name=\"twitter:label1\" content=\"Geschreven door\" \/>\n\t<meta name=\"twitter:data1\" content=\"Dionach Admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Geschatte leestijd\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/dionach.com\/nl\/cmsmap-a-simple-cms-vulnerability-scanner\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/dionach.com\/nl\/cmsmap-a-simple-cms-vulnerability-scanner\/\"},\"author\":{\"name\":\"Dionach Admin\",\"@id\":\"https:\/\/dionach.com\/nl\/#\/schema\/person\/e73f3537233924cf4944f7807068b3c8\"},\"headline\":\"CMSmap \u2013 A simple CMS vulnerability Scanner\",\"datePublished\":\"2014-06-04T12:38:44+00:00\",\"dateModified\":\"2024-02-06T13:12:12+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/dionach.com\/nl\/cmsmap-a-simple-cms-vulnerability-scanner\/\"},\"wordCount\":917,\"publisher\":{\"@id\":\"https:\/\/dionach.com\/nl\/#organization\"},\"keywords\":[\"tools\",\"web applications\"],\"articleSection\":[\"researchblog\"],\"inLanguage\":\"nl-NL\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/dionach.com\/nl\/cmsmap-a-simple-cms-vulnerability-scanner\/\",\"url\":\"https:\/\/dionach.com\/nl\/cmsmap-a-simple-cms-vulnerability-scanner\/\",\"name\":\"CMSmap \u2013 A simple CMS vulnerability Scanner\",\"isPartOf\":{\"@id\":\"https:\/\/dionach.com\/nl\/#website\"},\"datePublished\":\"2014-06-04T12:38:44+00:00\",\"dateModified\":\"2024-02-06T13:12:12+00:00\",\"description\":\"CMSmap is a simple Python open source CMS scanner that automates the process of detecting security flaws of the most popular CMSs. The main purpose of\",\"breadcrumb\":{\"@id\":\"https:\/\/dionach.com\/nl\/cmsmap-a-simple-cms-vulnerability-scanner\/#breadcrumb\"},\"inLanguage\":\"nl-NL\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/dionach.com\/nl\/cmsmap-a-simple-cms-vulnerability-scanner\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/dionach.com\/nl\/cmsmap-a-simple-cms-vulnerability-scanner\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/dionach.com\/nl\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"CMSmap \u2013 A simple CMS vulnerability Scanner\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/dionach.com\/nl\/#website\",\"url\":\"https:\/\/dionach.com\/nl\/\",\"name\":\"Dionach\",\"description\":\"Real Security in a Virtual World\",\"publisher\":{\"@id\":\"https:\/\/dionach.com\/nl\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/dionach.com\/nl\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"nl-NL\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/dionach.com\/nl\/#organization\",\"name\":\"Dionach\",\"url\":\"https:\/\/dionach.com\/nl\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-NL\",\"@id\":\"https:\/\/dionach.com\/nl\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.dionach.com\/wp-content\/uploads\/2025\/02\/cropped-Dionach-vertical-col-yel-nomios-black-1.jpg\",\"contentUrl\":\"https:\/\/www.dionach.com\/wp-content\/uploads\/2025\/02\/cropped-Dionach-vertical-col-yel-nomios-black-1.jpg\",\"width\":512,\"height\":512,\"caption\":\"Dionach\"},\"image\":{\"@id\":\"https:\/\/dionach.com\/nl\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/dionachcyber\",\"https:\/\/x.com\/dionachcyber\",\"https:\/\/uk.linkedin.com\/company\/dionach-ltd\",\"https:\/\/www.instagram.com\/dionachcyber\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/dionach.com\/nl\/#\/schema\/person\/e73f3537233924cf4944f7807068b3c8\",\"name\":\"Dionach Admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-NL\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/3061726a64a760303f6ea8f0976d3e8e0a6997b4da543be9a650b81584b4e79e?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/3061726a64a760303f6ea8f0976d3e8e0a6997b4da543be9a650b81584b4e79e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/3061726a64a760303f6ea8f0976d3e8e0a6997b4da543be9a650b81584b4e79e?s=96&d=mm&r=g\",\"caption\":\"Dionach Admin\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"CMSmap \u2013 A simple CMS vulnerability Scanner","description":"CMSmap is a simple Python open source CMS scanner that automates the process of detecting security flaws of the most popular CMSs. The main purpose of","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/dionach.com\/nl\/cmsmap-a-simple-cms-vulnerability-scanner\/","og_locale":"nl_NL","og_type":"article","og_title":"CMSmap \u2013 A simple CMS vulnerability Scanner","og_description":"CMSmap is a simple Python open source CMS scanner that automates the process of detecting security flaws of the most popular CMSs. The main purpose of","og_url":"https:\/\/dionach.com\/nl\/cmsmap-a-simple-cms-vulnerability-scanner\/","og_site_name":"Dionach","article_publisher":"https:\/\/www.facebook.com\/dionachcyber","article_published_time":"2014-06-04T12:38:44+00:00","article_modified_time":"2024-02-06T13:12:12+00:00","og_image":[{"width":512,"height":512,"url":"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2025\/02\/cropped-Dionach-vertical-col-yel-nomios-black-1.jpg?fit=512%2C512&ssl=1","type":"image\/jpeg"}],"author":"Dionach Admin","twitter_card":"summary_large_image","twitter_creator":"@dionachcyber","twitter_site":"@dionachcyber","twitter_misc":{"Geschreven door":"Dionach Admin","Geschatte leestijd":"6 minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/dionach.com\/nl\/cmsmap-a-simple-cms-vulnerability-scanner\/#article","isPartOf":{"@id":"https:\/\/dionach.com\/nl\/cmsmap-a-simple-cms-vulnerability-scanner\/"},"author":{"name":"Dionach Admin","@id":"https:\/\/dionach.com\/nl\/#\/schema\/person\/e73f3537233924cf4944f7807068b3c8"},"headline":"CMSmap \u2013 A simple CMS vulnerability Scanner","datePublished":"2014-06-04T12:38:44+00:00","dateModified":"2024-02-06T13:12:12+00:00","mainEntityOfPage":{"@id":"https:\/\/dionach.com\/nl\/cmsmap-a-simple-cms-vulnerability-scanner\/"},"wordCount":917,"publisher":{"@id":"https:\/\/dionach.com\/nl\/#organization"},"keywords":["tools","web applications"],"articleSection":["researchblog"],"inLanguage":"nl-NL"},{"@type":"WebPage","@id":"https:\/\/dionach.com\/nl\/cmsmap-a-simple-cms-vulnerability-scanner\/","url":"https:\/\/dionach.com\/nl\/cmsmap-a-simple-cms-vulnerability-scanner\/","name":"CMSmap \u2013 A simple CMS vulnerability Scanner","isPartOf":{"@id":"https:\/\/dionach.com\/nl\/#website"},"datePublished":"2014-06-04T12:38:44+00:00","dateModified":"2024-02-06T13:12:12+00:00","description":"CMSmap is a simple Python open source CMS scanner that automates the process of detecting security flaws of the most popular CMSs. The main purpose of","breadcrumb":{"@id":"https:\/\/dionach.com\/nl\/cmsmap-a-simple-cms-vulnerability-scanner\/#breadcrumb"},"inLanguage":"nl-NL","potentialAction":[{"@type":"ReadAction","target":["https:\/\/dionach.com\/nl\/cmsmap-a-simple-cms-vulnerability-scanner\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/dionach.com\/nl\/cmsmap-a-simple-cms-vulnerability-scanner\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/dionach.com\/nl\/"},{"@type":"ListItem","position":2,"name":"CMSmap \u2013 A simple CMS vulnerability Scanner"}]},{"@type":"WebSite","@id":"https:\/\/dionach.com\/nl\/#website","url":"https:\/\/dionach.com\/nl\/","name":"Dionach","description":"Real Security in a Virtual World","publisher":{"@id":"https:\/\/dionach.com\/nl\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/dionach.com\/nl\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"nl-NL"},{"@type":"Organization","@id":"https:\/\/dionach.com\/nl\/#organization","name":"Dionach","url":"https:\/\/dionach.com\/nl\/","logo":{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/dionach.com\/nl\/#\/schema\/logo\/image\/","url":"https:\/\/www.dionach.com\/wp-content\/uploads\/2025\/02\/cropped-Dionach-vertical-col-yel-nomios-black-1.jpg","contentUrl":"https:\/\/www.dionach.com\/wp-content\/uploads\/2025\/02\/cropped-Dionach-vertical-col-yel-nomios-black-1.jpg","width":512,"height":512,"caption":"Dionach"},"image":{"@id":"https:\/\/dionach.com\/nl\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/dionachcyber","https:\/\/x.com\/dionachcyber","https:\/\/uk.linkedin.com\/company\/dionach-ltd","https:\/\/www.instagram.com\/dionachcyber\/"]},{"@type":"Person","@id":"https:\/\/dionach.com\/nl\/#\/schema\/person\/e73f3537233924cf4944f7807068b3c8","name":"Dionach Admin","image":{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/secure.gravatar.com\/avatar\/3061726a64a760303f6ea8f0976d3e8e0a6997b4da543be9a650b81584b4e79e?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/3061726a64a760303f6ea8f0976d3e8e0a6997b4da543be9a650b81584b4e79e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3061726a64a760303f6ea8f0976d3e8e0a6997b4da543be9a650b81584b4e79e?s=96&d=mm&r=g","caption":"Dionach Admin"}}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/ph4Ojq-Kj","_links":{"self":[{"href":"https:\/\/dionach.com\/nl\/wp-json\/wp\/v2\/posts\/2871","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/dionach.com\/nl\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dionach.com\/nl\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dionach.com\/nl\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/dionach.com\/nl\/wp-json\/wp\/v2\/comments?post=2871"}],"version-history":[{"count":0,"href":"https:\/\/dionach.com\/nl\/wp-json\/wp\/v2\/posts\/2871\/revisions"}],"wp:attachment":[{"href":"https:\/\/dionach.com\/nl\/wp-json\/wp\/v2\/media?parent=2871"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dionach.com\/nl\/wp-json\/wp\/v2\/categories?post=2871"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dionach.com\/nl\/wp-json\/wp\/v2\/tags?post=2871"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}