XML-RPC is a file that enables WordPress to connect to other systems.
It is being done by a high standard of communication via HTTP as the transport mechanism and XML as the encoding mechanism.
The attacker sends a high amount requests to the website holding different usernames and passwords, by that the attacker performs a brute-force attack that could eventually “hit” one of the correct ones and allow them unauthorized access to your site.
To prevent this vulnerability from happening in the use download a plugin called Disable XML-RPC plugin, another option will be to add the following line to xmlrpc.php – add_filter (‘xmlrpc_enabled’, ‘__return_false’);
A brute force attack is a widespread cracking method.
Some attackers use applications and scripts as brute force tools. These tools try out numerous password combinations to bypass authentication processes.
Attackers use this method to “guess” passwords, discover hidden URLs, or expose encrypted or hashed passwords, Brute force attacks are relatively unsophisticated but have a significant gain.