Back to Library

Google Dork: powered by phplist" |...

Finds websites running phpList mailing list software with public subscription pages that reveal the software version.

Intermediate
Use with caution
vulnerability

Google Dork Query:

powered by phplist" | inurl:"lists/?p=subscribe" | inurl:"lists/index.php?p=subscribe" -ubbi -bugs +phplist -tincan.co.uk
0
Not verified

What It Does

This dork combines 'powered by phplist' text matching with 'inurl:' targeting subscription page URLs. It uses negative operators to filter out known false positives. Results show phpList installations with exposed subscribe pages, which can indicate the software version and potential vulnerabilities.

Common Use Cases

  • Vulnerable Software Discovery: Identify phpList installations running outdated versions that may be susceptible to known security vulnerabilities.
  • Email Infrastructure Mapping: Discover mailing list software deployments across an organization's web properties during security assessments.
  • Spam Vector Assessment: Find open phpList subscription forms that could be abused for spam relay or email enumeration.

How to Use Safely

  1. Search Google with this dork to find phpList-powered subscription pages.
  2. Check the page footer or source code for the exact phpList version number.
  3. Cross-reference the version against known CVEs for phpList.
  4. Report outdated installations and recommend updating to the latest phpList release.

Responsible Use Required

This dork should only be used on systems you own or have explicit authorization to test. Unauthorized access to computer systems is illegal. Always follow ethical guidelines and obtain proper permission before testing.

TAGS

php