• Resolved TheWatcher2

    (@thewatcher2)


    I routinely use an alternate WordPress login URL to hide my login area from hackers and bots. It completely prevents login attacks. However, upon cloning my website with WP Staging, I opened up the new admin site and proceeded to change the default WordPress login URL to an alternate one that I use for my other sites. Immediately after doing this, a crawler came to the new staging site and visited the new “hidden” WordPress login page! I have never had this alternative login site breached before by a bot. The bot that found this secret login URL was the BomboraBot and the breach occurred within seconds of creating the new wp-login URL.

    Somehow, WP Staging revealed my secret wp-login site and the BomboraBot found it! I have inspected the pages on the staging site, and the only way to find any reference to the secret wp-login URL is if someone was successfully logged into the staging site’s admin and inspected the header information, which only then shows the hidden login URL.

    Please let me know if there is a security issue with the use of the WP Staging plugin to create a cloned staging site. If I can’t determine where the breach occurred, then I’ll have to uninstall the plugin and change the alternative wp-login URL for my other sites.

Viewing 8 replies - 1 through 8 (of 8 total)
  • Plugin Author Rene Hermenau

    (@renehermi)

    The bot that found this secret login URL was the BomboraBot and the breach occurred within seconds of creating the new wp-login URL.

    What tool did you use to see the bot visiting your new login page?
    Log files, any JS based tracker, a certain plugin?

    What plugin do you use for hiding the login page?

    WP STAGING does not reveal any information about the existence of a staging site or where this staging site can be found, so I need more information on how you watched the bot visiting the new login URL to find an explanation for this.

    Please let me know if there is a security issue with the use of the WP Staging plugin to create a cloned staging site.

    If we are aware of one we would already have it fixed.

    Thread Starter TheWatcher2

    (@thewatcher2)

    I used the Wordfence Security plugin to monitor live traffic and the BomboraBot has been to the site several times probing the new login page. I used the Defender plugin to mask the usual WordPress login URL and create the new login URL. It happens to be the same hidden URL for logins that I’ve set up on every other website I’ve developed, including two live sites and one other testing site. No bot has ever successfully discovered the new login URL. It is not easily guessed and I don’t believe the new login URL could be reached without it being let out by a security breach. Perhaps WP Staging is incompatible with one of these two security plugins.

    Thread Starter TheWatcher2

    (@thewatcher2)

    I have noticed that WP Staging does not work with Defender’s 2-factor authentication settings, so that may indicate an incompatibility.

    Plugin Author Rene Hermenau

    (@renehermi)

    As default wp staging disables the permalinks on the staging site. To make your “hide login” work you have to activate the post name permalinks after creating the staging site.

    Please read this https://wp-staging.com/docs/activate-permalinks-staging-site/

    Please let me know if it works.

    Thread Starter TheWatcher2

    (@thewatcher2)

    Hi Rene,

    I actually activated the post name permalinks before trying to set up the “hide login” URL. Still no reason why the alternate wp-login site could be found by the bot. I’ve inactivated the Defender Security plugin for the WP Staging site, which is not ideal. I’ll have to use another route to setting up a hidden login URL.

    Thanks,
    Greg

    Thread Starter TheWatcher2

    (@thewatcher2)

    I also just noticed that the WP Staging plugin is incompatible with the WordPress Under Construction plugin. Instead of showing visitors who are not logged in the under construction page, it shows the wp-login page. That’s convenient for any malicious bots! I had to shut that plugin down also. It’s not really a dev site now.

    Plugin Author Rene Hermenau

    (@renehermi)

    I am trying to reproduce it, Greg.

    Besides that:

    A staging site should already be a hidden site. Thus renaming the login URL is not necessary anymore.

    Take this one: example.com/myhidden-stagingsite/wp-admin

    This URL is not public, so it should have the same effect as renaming the default admin login on the live site like example.com/my-hidden-wp-admin

    I don’t know the defender plugin nor how it works. A separate connection to the staging site could be required to show accurate traffic data. Maybe it’s showing data sources from the live site on the staging site.

    It’s very unlikely that a bot can visit your new staging within seconds if the URL has not been made public.

    I will have a look at it and think about this more.

    Thread Starter TheWatcher2

    (@thewatcher2)

    Rene,

    Thanks for your quick replies. Maybe I did something wrong right from the beginning, because bots started crawling the staging site (https://mysite.com/dev2) as soon as it was established. At that time, bots were going to //mysite.com/dev2/wp-login/ before I got a chance to set up the hidden wp-login URL. So from the start, the staging site was discovered as a folder within my main site. Not sure how this may have happened.

    Thanks,
    Greg

Viewing 8 replies - 1 through 8 (of 8 total)
  • The topic ‘Alternate WordPress login URL Revealed’ is closed to new replies.