Hummingbird Output Reveals Admin URL
-
Hi there,
Despite the fact that I have various precautions in place to stop brute force logins, including obscuring the admin URL, such attempts are still happening. After looking around and contacting the security plugin directly, my attention has been drawn to something Hummingbird outputs.
Now, this could get complicated. Here’s the code:
var codepeople_search_in_place = {"own_only":"1","result_number":"5","more":"More Results","empty":"0 results","char_number":"10","root":"\/\/fibrojedi.me.uk\/ADMINURL\/","home":"https:\/\/fibrojedi.me.uk","summary_length":"20","
This is visible to logged out users. (I have 2FA auth, so no one will get in, the issue is attempting to log in should be impossible).
The reason I think this is Hummingbird-related is because of the id on the script tag ( id=”wphb-2-js-extra”)
The code above draws from a separate plugin that powers my site’s search “Search in Place”. I will be setting up a thread with them also. But the fact remains that hummingbird still outputs this on the page.
What can I do to prevent this happening please?
Thanks,PS: if Search in Place have a solution before you get back to me, I’ll let you know and close this thread. Thank you.
- The topic ‘Hummingbird Output Reveals Admin URL’ is closed to new replies.