BRUTEFORCE ATTACK ANALYSIS VIA XMLRPC.PHP FILE ON WORDPRESS

Authors

  • Yusuf Nurrachman Politeknik Negeri Media Kreatif, Indonesia
  • R.Sulistiyo Wibowo, S.Sn.,M.Sn Politeknik Negeri Media Kreatif, Indonesia
  • Nofiandri Setyasmara, M.T Politeknik Negeri Media Kreatif, Indonesia

DOI:

https://doi.org/10.46961/jip.v13i2.1890

Abstract

WordPress provides an XML-RPC feature through the xmlrpc.php file for external communication. However, this filter is often exploited as a brute-force attack vulnerability because it supports system.multicall, which allows multiple login attempts in a single request. This study analyzed brute-force attacks against xmlrpc.php through simulations in a local environment using WPscan and a Python script called lokoscannerX_ver1. Testing was conducted using two scenarios: WordPress without security and WordPress with security using the Disable XML-RPC plugin and .htaccess file configuration. The results showed that WordPress without security was easily attacked and overloaded the virtual server on the test environment. Meanwhile, after implementing the Disable XML-RPC plugin, attacks were blocked and prevented, while the .htaccess configuration only blocked execution but still allowed user information to be detected. This study emphasizes the importance of disabling XML-RPC as a basic WordPress security measure.

Downloads

Published

2025-12-31

How to Cite

Nurrachman, Y., R.Sulistiyo Wibowo, S.Sn.,M.Sn, & Nofiandri Setyasmara, M.T. (2025). BRUTEFORCE ATTACK ANALYSIS VIA XMLRPC.PHP FILE ON WORDPRESS. Jurnal Ilmiah Publipreneur, 13(2), 46–56. https://doi.org/10.46961/jip.v13i2.1890

Citation Check