REST API leaks usernames via /wp-json/wp/v2/users
By default anyone can pull your usernames via the REST API. That's ammo for brute-force.
Try this first
- 1Install a security plugin that blocks the REST users endpoint for non-logged-in users
- 2Or add a filter on 'rest_authentication_errors' in functions.php
- 3Test in incognito: /wp-json/wp/v2/users should return 401 or 403
- 4Leave other endpoints open for plugins that need them
When to bring us in
Blocking REST entirely breaks Gutenberg and many plugins, only cover the users endpoint.
See also
- WordPress, plugins and theme have gone 6+ months without updatesOut-of-date WP is the number-one entry for malware. Don't just hit 'update all', back up first.
- Theme update broke the layout or threw a fatal errorThemes overwrite custom CSS on update unless you use a child theme.
- WordPress shows a blank screen after a plugin install or updateWSOD (white screen of death) is usually one crashing plugin. You isolate it.
None of the above fits?
Describe your situation below. We pass your input plus the steps you already saw to our AI and return tailored next-step advice. If it's too risky to DIY, we'll say so.
Or skip the DIY entirely
Our Managed IT clients do not look these things up. One point of contact, a fixed monthly price, resolved within working hours.