During a WordPress install, attackers and bots will probe for specific files to find vulnerabilities and get in. Firewalls and security plugins will block access to certain files to prevent threats. But sometimes this will break the install and you’ll need to manually adjust.
Here are the most common targets:
1. wp-config.php – This file has database credentials and security keys. If exposed, they can take full control of your site.
2. install.php & setup-config.php – These files install WordPress but are exploitable if left exposed after install.
3. xmlrpc.php – For remote connections and mobile apps but often targeted in brute-force login attacks.
4. readme.html – Displays WordPress version info making it easier for hackers to exploit known vulnerabilities.
5. debug.log – Stores error logs which may contain sensitive info that can be used for attacks.
Firewalls block these files for security reasons. Configuring whitelist rules or temporarily disabling strict settings during install will avoid disruptions and keep your site secure.
Leave a Reply