• Hi guys, I’m presently being bled dry of bandwidth by some one / some thing that’s trying to make use of the “xmlrpc.php” file, which — incidentally — no longer exists.

    I’ve been in discussion with the host:

    “There are two issues here, it appears to be vulnerability scanning looking for xmlrpc.php and the redirects performed by WordPress. The vulnerability has been removed but the WordPress 404 redirect is still loading your website, i.e. using bandwidth.”

    Sadly, all I’m able to say is that I may be using 3.2 or above, since I cannot sign in to see which it is, due to the lack of bandwidth.

    At this point, I have zero idea how to stop this, so any advice would be much appreciated.

Viewing 2 replies - 1 through 2 (of 2 total)
Viewing 2 replies - 1 through 2 (of 2 total)
  • The topic ‘Solution to xmlrpc.php vulnerability’ is closed to new replies.