Feature request: Add support for XMLRPC attacks
-
I noticed I got a lot of failed login attempts as “admin”, even thought I had set the options to immediately block any attempts with this username. After some digging it turns out attackers not using the login page, but accessing the xmlrpc.php page with supplied credentials.
Wordfence runs the authenticateFilter() method on these attempts, but as no post vars are set, it doesn’t match the login attemt to the blacklist of usernames to immediately block.
SUGGESTION: Add a check if the call is made to xmlrpc and extract the username from the xml in the request body instead of assuming $_POST[‘log’] to make the blocking work on xmlrpc attacks as well.
- The topic ‘Feature request: Add support for XMLRPC attacks’ is closed to new replies.