Script to validate WordPress CVE-2022-21661# WordPress CVE-2022-21661 Scanner
## Usage
```bash
python wordpress_scanner.py -H <host or ip address> -p <port> -ssl <support ssl/tls> -proxy <proxy address> -path <custom path>
```
## Help
```
WordPress Scanner for CVE-2022-21661
options:
-h, --help show this help message and exit
-H HOST, --host HOST Host or IP address
-p PORT, --port PORT Port number
-ssl, --ssl_support Support SSL/TLS
-proxy PROXY, --proxy PROXY
Proxy address (e.g., http://localhost:8080/)
-path PATH, --path PATH
Custom path for validation, default: /wp-admin/admin-ajax.php
```
[4.0K] /data/pocs/fd8ab325d434fbe4f21b858ed9b0b13e11cb85e6
├── [4.4K] CVE-2022-21661.py
├── [ 636] README.md
└── [ 42] requirements.txt
0 directories, 3 files