WordPress – wp-admin exposed


During the scan, Kayran managed to find the WordPress – wp-admin exposed vulnerability.
The admin login page (example.com/wp-admin/) is accessible from any IP address.

An attacker could exploit this finding to perform Brute Force attacks against users or to create a similar phishing page in order to get admin\user login credentials, since, basically, anyone is able to access the login page.

Hackers and bots (being used by attackers), are trying to attack a WordPress site’s login page often look for it in it’s default location. Instead of hosting the login page on /wp-login.php, install it in a directory folder with a random name, only known to trusted people.


Restrict access to the login page (/wp-admin/) section to any unauthorized IP addresses.

You can set that kind of configuration easily in your .htaccess, there is a sample code you can start with :
AuthUserFile /dev/null
AuthGroupFile /dev/null
AuthName “WordPress Admin Access Control”
AuthType Basic
order deny,allow
deny from all

whitelisted IP addresses

allow from xx.xx.xx.xxx
allow from xx.xx.xx.xxx



< Return to all Vulnerabilities

Browser Exploitation

We know that it’s possible to exploit weaknesses (or vulnerabilities) that exist in anything, from a certain code to the entire application, let’s talk about

Read More »