How to bulk Enable/Disable WordPress XML-RPC using cPFence Tools?

Control XML-RPC Access (WebUI Method)

 

  1. Log into cPFence WebUI and choose the server.
  2. Open Tools & UtilitiesWP-AutoShield Bulk Tools.
  3. Select Disable XML-RPC to block the endpoint with a 403, or Enable XML-RPC when remote apps require it.
  4. Confirm the action; the UI propagates the change to all detected sites (or just the subset you selected).
  5. Review the streamed log for any site that needs manual intervention.

Disable XML-RPC to reduce brute-force and amplification attacks while still allowing selective re-enablement.

Tip: Ensure autoshield_disable_wp_xmlrpc is set to ‘Off’ in the Settings page (if it’s currently on), or WP-AutoShield will automatically re-disable it during the next 6:10 AM run.

Command Line (CLI) Method

  1. SSH into the server.
  2. Disable XML-RPC globally:
    cpfence --bulk-disable-wp-xmlrpc
  3. Enable XML-RPC when integrations need it:
    cpfence --bulk-enable-wp-xmlrpc

Remember to re-enable WP login protections if you grant XML-RPC access for mobile editors.


Need Further Assistance?

Visit our Knowledgebase or contact our support team for help.

  • 0 Usuários acharam útil
Esta resposta lhe foi útil?

Artigos Relacionados

How to Perform and Export Wordpress Vulnerability Scans with cPFence?

cPFence provides powerful tools for identifying and analyzing Wordpress vulnerabilities. With the...

How to Generate a List of All WordPress Sites on Your Server?

cPFence provides an easy way to generate a comprehensive list of all WordPress sites on your...

How to Quickly Identify Infected WordPress Sites Using cPFence?

cPFence makes it easy to identify and clean infected WordPress sites on your server. Follow the...

How to Clean an Infected WordPress Site?

Has your WordPress site been infected, and cPFence reported malware or other issues? Don’t worry;...

How to Secure Your WordPress Sites with cPFence?

WordPress is a powerful platform, but it can become vulnerable if not properly secured. With...