{"id":27376,"date":"2018-07-03T04:28:22","date_gmt":"2018-07-03T09:28:22","guid":{"rendered":"https:\/\/www.rosehosting.com\/blog\/?p=27376"},"modified":"2023-04-05T04:10:43","modified_gmt":"2023-04-05T09:10:43","slug":"what-is-wordpress-xml-rpc-and-how-to-stop-an-attack","status":"publish","type":"post","link":"https:\/\/www.rosehosting.com\/blog\/what-is-wordpress-xml-rpc-and-how-to-stop-an-attack\/","title":{"rendered":"What Is WordPress XML-RPC and How to Stop an Attack"},"content":{"rendered":"
<\/div>

\"What<\/p>\r\n

 <\/p>\r\n\r\n

\r\n
\"xml-rpc<\/figure>\r\n<\/div>\r\n\r\n\r\n\r\n

XML-RPC is a\u00a0remote procedure call protocol that allows anyone to interact with your WordPress website remotely. In other words, it’s a way to manage your site without having to log in manually via the standard “wp-login.php” page. It’s widely used by plugins, most famously by Automattic’s own Jetpack plugin. These days, however, the word “XML-RPC” has gotten a bad name. In this tutorial, we will explain what is WordPress XML-RPC and how to stop an XML-RPC attack on your WordPress website.\u00a0<\/p>\r\n\r\n\r\n\r\n

<\/p>\r\n\r\n\r\n\r\n

\n

Table of Contents<\/p>\n