WordPress – wp-admin exposed

Description

During the scan, Kayran managed to find the WordPress – wp-admin exposed vulnerability.
The admin login page (example.com/wp-admin/) is accessible from any IP address.

An attacker could exploit this finding to perform Brute Force attacks against users or to create a similar phishing page in order to get admin\user login credentials, since, basically, anyone is able to access the login page.

Hackers and bots (being used by attackers), are trying to attack a WordPress site’s login page often look for it in it’s default location. Instead of hosting the login page on /wp-login.php, install it in a directory folder with a random name, only known to trusted people.

Recommendation

Restrict access to the login page (/wp-admin/) section to any unauthorized IP addresses.

You can set that kind of configuration easily in your .htaccess, there is a sample code you can start with :
AuthUserFile /dev/null
AuthGroupFile /dev/null
AuthName “WordPress Admin Access Control”
AuthType Basic
<LIMIT GET>
order deny,allow
deny from all

whitelisted IP addresses

allow from xx.xx.xx.xxx
allow from xx.xx.xx.xxx
</LIMIT>

References

https://wordpress.org/support/

< Return to all Vulnerabilities

Red Team

You’ve probably heard that there are teams in the Cyber field called Red Team and Blue Team. Let’s talk about the red one, shall we?

Read More »

Man-In-The-Middle Attacks

Do you know these people who just push themselves into conversations?That’s Man-In-The-Middle Attacks. And from a wider angle, Man-In-The-Middle Attacks, or MITM, are built around

Read More »

Explaining API

We’ve talked about API’s Vulnerability in here, but i feel like there’s much more to talk about and explain since this is a big and

Read More »