CMSmap - Scanner to detect security flaws of the most popular CMSs (WordPress, Joomla and Drupal)

Thursday, February 19, 2015

CMSmap is a python open source CMS scanner that automates the process of detecting security flaws of the most popular CMSs. The main purpose of CMSmap is to integrate common vulnerabilities for different types of CMSs in a single tool.

At the moment, CMSs supported by CMSmap are WordPress, Joomla and Drupal.

Please note that this project is an early state. As such, you might find bugs, flaws or mulfunctions. Use it at your own risk!

You can download the latest version of CMSmap by cloning the GitHub repository:
git clone

CMSmap tool v0.3 - Simple CMS Scanner
Author: Mike Manzotti
Usage: -t <URL>
          -t, --target    target URL (e.g. '')
          -v, --verbose   verbose mode (Default: false)
          -T, --threads   number of threads (Default: 5)
          -u, --usr       username or file 
          -p, --psw       password or file
          -i, --input     scan multiple targets listed in a given text file
          -o, --output    save output in a file
          -k, --crack     password hashes file
          -w, --wordlist  wordlist file (Default: rockyou.txt - WordPress only)       
          -a, --agent     set custom user-agent  
          -U, --update    (C)MSmap, (W)ordpress plugins and themes, (J)oomla components, (D)rupal modules
          -f, --force     force scan (W)ordpress, (J)oomla or (D)rupal
          -F, --fullscan  full scan using large plugin lists. Slow! (Default: false)
          -h, --help      show this help   

Example: -t -t -f W -F -t -i targets.txt -o output.txt -t -u admin -p passwords.txt -k hashes.txt

Subscribe via e-mail for updates!