← Back to Pakistan Cyber Tour

Annex 02 — WordPress REST API Exposure

Pakistan OSINT Operation — 01 March 2026 — 3 targets, 13.4 MB combined

379Pages Extracted
504Posts Extracted
2,059Media Items (with download URLs)
3Users Enumerated
13.4 MBTotal Data

Three Pakistani organizations expose their complete WordPress REST API without authentication. The API endpoints at /wp-json/wp/v2/* yield all pages, posts, media items with direct download URLs, user accounts, categories, and tags — no credentials required.

Target 1: QAU.EDU.PK — Quaid-i-Azam University

Pakistan's #1 ranked university (QS World Rankings)

FieldValue
Servernginx/1.14.1 (current: 1.27.x — 7 years old)
CMSWordPress
API Schema306 KB (full)
User EnumerationBlocked (403 on /wp-json/wp/v2/users)
EndpointRecordsSize
Pages2002.4 MB
Posts4841.4 MB
Media603 items200 KB metadata
Categories164179 KB
Tags1312 KB
Search (43 terms)1,545+ results1.2 MB
Total6.6 MB

Additional Exposed Endpoints (Beyond API)

PathSizeExposure
/webmail/4.9 KBRoundcube Webmail login — @qau.edu.pk accounts
/phpmyadmin/redirectphpMyAdmin confirmed on server
/admin/94 KBAdministration section (public access)
/intercom-directory/92 KB71 KB PDF — complete university phone directory
/faculty/110 KBFaculty/employee directory
/downloads/121 KBDownloadable documents
Risk Assessment — CRITICAL: Full WordPress API + Roundcube webmail + phpMyAdmin + outdated nginx/1.14.1 = high-value target for credential attacks and potential webshell deployment via phpMyAdmin.

Search Intelligence (43 keyword probes)

Search TermResultsIntelligence Value
faculty100Faculty member profiles, appointments
professor100Individual professor data
staff84Staff directories by section
admission77Admission notices, merit lists
fee90Fee structures per program
scholarship57Financial aid programs
security65Campus security operations, CCTV references
salary3Salary section staff details

Target 2: BALOCHISTAN.GOV.PK — Government of Balochistan

Provincial government — the only remaining live provincial .gov.pk portal during wartime

FieldValue
ServerCloudflare (origin unknown)
CMSWordPress + Elementor
User EnumerationEXPOSED — 1 user found

WordPress Users Enumerated

IDUsernameGravatar Hash
4admin_bal49d835e800b2f8de9d230f39d1718274e0364b4aff0a72de4bd274d82dbbf38b
EndpointRecordsSize
Pages1491.0 MB
Posts1258 KB
Media1,297 items4.6 MB metadata (with direct download URLs)
Users1917 bytes
API Schema1235 KB
Total5.9 MB

Government content exposed via API: Divisional commissioner appointments, Gwadar Safe City project staffing, budget documents 2020–2026 (PSDP, White Papers, Volumes I–VIII), departmental legislation for 14+ departments, citizen services portal URLs.

robots.txt: Blocks AI crawlers (ClaudeBot, GPTBot, CCBot, Bytespider) — but the WordPress REST API is completely unprotected.

Target 3: SIT.BALOCHISTAN.GOV.PK — Science & IT Department

Provincial IT department — shares administrator with balochistan.gov.pk

IDUsernameGravatar Hash
1admin49d835e800b2f8de9d230f39d1718274e0364b4aff0a72de4bd274d82dbbf38b
5sitbalochistango5170d034630581b7e24444f63ad4abc270f222516526d15787a6198ffe6229ac
CRITICAL CORRELATION: User "admin" (ID 1) on sit.balochistan.gov.pk has the identical gravatar hash as admin_bal (ID 4) on balochistan.gov.pk. This confirms a single person administers both Balochistan government WordPress installations. /wp-login.php is directly accessible (8.3 KB) on the SIT domain.

Cross-Target Analysis: Single-Admin Vulnerability

balochistan.gov.pk     → admin_bal (ID 4) → gravatar: 49d835e800b2f8...
sit.balochistan.gov.pk → admin     (ID 1) → gravatar: 49d835e800b2f8...
                                                       ↑ IDENTICAL HASH

Single email address = administrator of two provincial government sites.
Compromise one account = both sites fall.

WordPress Security Posture Comparison

FeatureQAUBalochistanSIT Balochistan
API publicly accessibleYESYESYES
User enumerationBlocked (403)EXPOSEDEXPOSED
wp-login.php accessibleUnknownUnknownYES (8.3 KB)
Webmail accessibleYES (Roundcube)NoNo
phpMyAdminYESNoNo
Outdated server softwareYES (nginx/1.14.1)Unknown (Cloudflare)Unknown (Cloudflare)

Combined Extraction

CategoryCombined Total
Pages379 (200 + 149 + 30)
Posts504 (484 + 12 + 8)
Media items2,059 (603 + 1,297 + 159)
Users enumerated3
API schemas788 KB
Total data13.4 MB