WordPress XML-RPC authentication brute force

Description

During the scan, Kayran managed to find a Vulnerable XML-RPC file. XML-RPC is a file that enables WordPress to connect to other systems. Being done by a high standard of communication using HTTP as a transport mechanism and XML as the encoding mechanism.

The attacker sends high amount of requests to the website holding different usernames and passwords, that way, attackers performs a brute-force attack that could eventually, “hit” one of the correct ones and will allow them unauthorized access to your site.

A brute force attack is a widespread cracking method.Some attackers use applications and scripts as tools to perform these types of attacks. These tools try out numerous password combinations to bypass authentication processes. Attackers use this method to “guess” passwords, discover hidden URLs and expose encrypted or hashed passwords. Brute Force attacks are relatively unsophisticated but their chances of success are high.

Recommendation

To prevent this vulnerability, you should download a plugin called “Disable XML-RPC plugin”.
Another option will be to add the following line to xmlrpc.php –
add_filter (‘xmlrpc_enabled’, ‘__return_false’);

References

https://wordpress.org/support/article/updating-wordpress/

< Return to all Vulnerabilities

HTTP VS. HTTPS

You must have once wondered what HTTP means and what is the difference between that ugly word to HTTPS, and if not, then please read

Read More »