Support

Admin Tools for WordPress

#41601 WordPress XML-RPC Pingback Abuse

Posted in ‘Admin Tools for WordPress’
This is a public ticket

Everybody will be able to see its contents. Do not include usernames, passwords or any other sensitive information.

Environment Information

WordPress version
6.7.1
PHP version
8.1.29
Admin Tools version
1.6.7

Latest post by nicholas on Tuesday, 18 February 2025 10:07 CST

doi.admin

Hello,

We'r using Qualys to identify critical vulnerabilities and he detected an "WordPress XML-RPC Pingback Abuse" vulnerabilities on one of our website. 

The "Disable XML-RPC" option is on "Yes" and however the issue is still here. Is there an issue with this option ? What can we do to resolve that vulnerabilitie ?

Thanks !

 

nicholas
Akeeba Staff
Manager

As documented, when you use the Disable XML-RPC option in Admin Tools the xmlrpc.php file is accessible but ALWAYS returns HTTP 405 without honouring the command it received, i.e. it is pretending that the authorisation failed. This is by design, to confuse bots. Guess what? Qualys also uses a bot to evaluate your site, and we confused it too! There is nothing to worry about. What you see is a false positive.

Nicholas K. Dionysopoulos

Lead Developer and Director

🇬🇷Greek: native 🇬🇧English: excellent 🇫🇷French: basic • 🕐 My time zone is Europe / Athens
Please keep in mind my timezone and cultural differences when reading my replies. Thank you!