xmlrpc.php
xmlrpc.php is a Wordpress Remote Procedure Call "module" that can be used positively and by hackers to compromise a Wordpress webite.
Wordpress say in their website: (or it could be hostinger)
XML-RPC on WordPress is actually an API that allows developers who make 3rd party application and services the
ability to interact to your WordPress site. The XML-RPC API that WordPress provides several key functionalities
that include:
- Publish a post
- Edit a post
- Delete a post.
- Upload a new file (e.g. an image for a post)
- Get a list of comments
- Edit comments
Top
What hostinger.co.uk say about xmlrpc.php
Why You Should Disable Xmlrpc.php
The biggest issues with XML-RPC are the security concerns that arise. The issues aren’t with XML-RPC directly,
but instead how the file can be used to enable a brute force attack on your site.
Sure, you can protect yourself with incredibly strong passwords, and WordPress security plugins. But, the best mode
of protection is to simply disable it.
There are two main weaknesses to XML-RPC which have been exploited in the past.
The first is using brute force attacks to gain entry to your site. An attacker will try to access your site using xmlrpc.php
by using various username and password combinations. They can effectively use a single command to test hundreds of
different passwords. This allows them to bypass security tools that typically detect and block brute force attacks.
The second was taking sites offline through a DDoS attack. Hackers would use the pingback feature in WordPress to send
pingbacks to thousands of sites instantaneously. This feature in xmlrpc.php gives hackers a
nearly endless supply of IP addresses to distribute a DDoS attack over.