I’m currently going through spam message attack from an unknown source and I’ve tried to locate where my blog is located but i cant really find it on my wordpress but each spam message always comes in, i have installed several plugins and other connections but it is not stopping
]]>Is there something you recommend to stop these card-testing attempts?
Thanks!
]]>thnx
]]>Does AIOS prevent WooCommerce Fake Orders?
Does AIOS add an honeypot or captcha in the checkout page?
I ask because I am not sure if AIOS checks also the Checkout Page to prevent fake orders. I would know what the tool does for these cases.
Waiting for your reply, I wish you a very nice day.
King regards
G. Aloe
]]>“The IP address 127.0.0.1 is in a range of IP addresses that Wordfence does not block. The IP range may be internal or belong to a service safe to allow access for.”….
This has only been happening the past 2 weeks. The IP address is hitting on all manner of urls that do not exist, for example “(mysite).co.uk/………wp-includes/sodium_compat/src/Core32/Poly1305/radio.php” which do not exist.
Is this some sort of false positive or is someone or something using this to try and jack into the iste?
Any help appreciated
Thanks
]]>I have a site in which, after activating an activity log plugin, I have discovered unauthorized admin account logins despite changing password multiple times, using long randomly generated passwords. I have already blocked xmlrpc.php using a plugin. When I checked visit logs in C-Panel, matching the suspicious login IP address and time to that recorded in the dasboard’s activity log (plugin), it looks like login was via example.com/wp-json/wp/v2/users (where example.com is our own url) which I think has something to do with REST API. It looks like the hacker was able to somehow login WITHOUT a password.
I understand I can easily disable the /wp-json/wp/v2/users but we NEED REST API because xmlrpc.php has been disabled (which helped reduce brute force attack) and we have plugins (such as Mail SMTP) that require connections to third party sites such as Google (where secret keys are used). How can I secure the site and still be able to use REST API?
]]>We are getting reports from our security system that your plugin has a security issue:
#WordPress Disable User Login plugin <= 1.3.7 – Cross Site Request Forgery (CSRF) vulnerability
-Vulnerability type: Cross Site Request Forgery (CSRF)
-No Update Available
So when will this be fixed? I can see your plugin was updated last time 5 months ago. Is there a planned fix for this security issue?
Thanks in advance.
Kind regards
AngryWarrior