Resource Limitation: WordPress xmlrpc.php Exposed¶
Identifier:
wordpress_xmlrpc_php_exposed
Scanner(s) Support¶
| GraphQL Scanner | REST Scanner | WebApp Scanner | ASM Scanner |
|---|---|---|---|
Description¶
WordPress xmlrpc.php endpoint exposure allows unauthenticated access to the XML-RPC interface, enabling attackers to perform brute-force login attempts, resource-intensive pingbacks, or denial-of-service attacks.
How we test: We attempt to access the /xmlrpc.php endpoint without authentication and analyze responses to detect if the XML-RPC interface is exposed. We check if the endpoint is accessible and if it allows unauthenticated requests that could be abused for attacks.
Configuration¶
Example¶
Example configuration:
Reference¶
skip¶
Type : boolean
Skip the test if true.