🛡️ WordPress User ID Exposure Checker
📚 Complete Guide & FAQ
🎯 The Problem This Tool Solves
WordPress sites often unknowingly expose user IDs and login usernames through public APIs and URL patterns. Attackers exploit this information to launch targeted brute force attacks against your admin panel. This tool helps you identify these vulnerabilities before hackers do.
📋 How to Use This Tool
Step 1: Enter Your WordPress URLInput your WordPress website address in the field above. The protocol (http/https) is optional - we'll add it if missing.
Step 2: Click Scan for VulnerabilitiesOur tool will query both the WP-JSON API endpoint and test for author enumeration vulnerabilities to detect exposed user information.
Step 3: Review the ResultsIf vulnerabilities are found, you'll see a list of exposed user IDs and usernames. You can copy individual usernames or view the complete JSON response.
Step 4: Secure Your SiteUse the information to implement security measures (see FAQ below) to protect your WordPress installation.
❓ Frequently Asked Questions
Why is user ID exposure a critical security issue?When attackers know valid usernames, they can focus brute force attacks on real accounts instead of guessing both username and password. This dramatically increases their success rate and puts your admin accounts at serious risk.
How do hackers exploit these vulnerabilities?Automated bots constantly scan WordPress sites for exposed user data. They use this information to build targeted attack lists, attempting thousands of password combinations against known usernames, often from distributed networks to avoid IP blocking.
What's the difference between WP-JSON and author enumeration?WP-JSON is WordPress's REST API that may expose user data at /wp-json/wp/v2/users
. Author enumeration exploits the /?author=ID
parameter that redirects to author archive pages, revealing usernames in the URL.
How can I protect my WordPress site?Essential steps include: 1) Disable or restrict WP-JSON user endpoints, 2) Block /?author=
queries via .htaccess or security plugins, 3) Use unique usernames (never "admin"), 4) Implement strong passwords and 2FA, 5) Hide your login page with custom URLs, 6) Deploy a Web Application Firewall.
Will this tool harm my website?No, this tool is completely safe and non-invasive. It only reads publicly available information that's already exposed. We don't attempt logins, modify data, or store any information from your site.
Why can't I scan localhost or private IPs?For security reasons, we block scanning of private networks and local addresses. This prevents potential abuse and ensures the tool is only used for legitimate website security testing.
Is my data stored anywhere?No, all checks are performed in real-time and results are displayed only in your browser. We don't log, store, or share any information about the sites you scan or the vulnerabilities found.
What if the scan shows no results?If no user data is found, it could mean: 1) Your site is properly secured (great!), 2) The site isn't WordPress, 3) Security plugins are blocking these endpoints, or 4) The site has custom configurations. No results is actually a good sign for security.
💬 Need assistance or have suggestions? Visit our Support Center for help with security concerns or tool feedback.