Resource Limitation: WordPress xmlrpc.php Exposed¶
Identifier:
wordpress_xmlrpc_php_exposed
Scanner(s) Support¶
| GraphQL Scanner | REST Scanner | WebApp Scanner |
|---|---|---|
Description¶
The issue arises when the xmlrpc.php file is exposed and accessible without authentication, allowing attackers to abuse the XML-RPC interface. This can lead to brute-force login attempts, resource-intensive pingbacks, or denial-of- service attacks. Securing or disabling this endpoint is critical to prevent abuse.
Configuration¶
Example¶
Example configuration:
---
security_tests:
wordpress_xmlrpc_php_exposed:
assets_allowed:
- REST
- GRAPHQL
- WEBAPP
skip: false
Reference¶
assets_allowed¶
Type : List[AssetType]*
List of assets that this check will cover.
skip¶
Type : boolean
Skip the test if true.