WordPress XML-RPC Interface Detected

medium Web App Scanning Plugin ID 98215

Synopsis

WordPress XML-RPC Interface Detected

Description

A public facing WordPress XML-RPC interface has been detected.

An attacker may be able to launch attacks against the web server Via XML-RPC including:
- Login into WordPress backend Administrative interface
- Brute force user credentials
- Use pingbacks (for scanning or fingerprinting for example)

Solution

Block requests to sensitive user information at the server using .htaccess file or WAF for example. You should block or redirect all requests made to 'xmlrpc.php' (via GET and POST requests).

See Also

https://codex.wordpress.org/XML-RPC_Support

https://codex.wordpress.org/htaccess

Plugin Details

Severity: Medium

ID: 98215

Type: remote

Published: 5/11/2018

Updated: 11/17/2021

Scan Template: api, basic, full, pci, scan

Risk Information

VPR

Risk Factor: Low

Score: 2.9

CVSS v2

Risk Factor: Medium

Base Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

CVSS Score Source: Tenable

CVSS v3

Risk Factor: Medium

Base Score: 5.3

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

CVSS Score Source: Tenable

Vulnerability Information

Exploit Available: true

Reference Information