WordPress – wp-admin exposed

Description

During the scan, Cytrix managed to find the WordPress – wp-admin exposed vulnerability.
The admin login page (example.com/wp-admin/) is accessible from any IP address.

An attacker could exploit this finding to perform Brute Force attacks against users or to create a similar phishing page in order to get admin\user login credentials, since, basically, anyone is able to access the login page.

Hackers and bots (being used by attackers), are trying to attack a WordPress site’s login page often look for it in it’s default location. Instead of hosting the login page on /wp-login.php, install it in a directory folder with a random name, only known to trusted people.

Recommendation

Restrict access to the login page (/wp-admin/) section to any unauthorized IP addresses.

You can set that kind of configuration easily in your .htaccess, there is a sample code you can start with :
AuthUserFile /dev/null
AuthGroupFile /dev/null
AuthName “WordPress Admin Access Control”
AuthType Basic
<LIMIT GET>
order deny,allow
deny from all

whitelisted IP addresses

allow from xx.xx.xx.xxx
allow from xx.xx.xx.xxx
</LIMIT>

References

https://wordpress.org/support/

< Return to all Vulnerabilities