Documents / Sentinel Security / Features

API Protection

API Protection

API Protection is a suite of features that strengthens the security of the WordPress REST API and XML-RPC. You can disable unnecessary endpoints, apply rate limits, and prevent user enumeration — all from the admin dashboard.

Why API Protection Matters

If the REST API Diagnosis detects issues, leaving them unaddressed poses a security risk. However, completely disabling the REST API can break the Gutenberg editor and other plugin functionality.

API Protection takes the approach of selectively blocking only dangerous endpoints while keeping the ones you need.

Feature Overview

1. Endpoint Control

Enable or disable individual REST API endpoints.

Protected ItemDescriptionDefault
/wp/v2/usersBlock retrieval of the user listBlocked
/wp/v2/users/meCurrent logged-in user's own infoAllowed
?author=NUser enumeration via Author IDBlocked
oEmbed AuthorAuthor name in oEmbed responsesRemoved

2. XML-RPC Control

SettingDescriptionDefault
Disable XML-RPC entirelyBlock all access to xmlrpc.phpEnabled (recommended)
Disable PingbackDisable only the pingback.ping methodEnabled
Application PasswordsApplication passwords for REST APIDisabled

3. Rate Limiting

Limit the number of requests to API endpoints to prevent automated attacks via the API.

SettingDescriptionDefault
Max RequestsMaximum requests per time window60/min
Block DurationBlock duration when rate is exceeded5 minutes
Excluded PathsPaths excluded from rate limiting/wp/v2/posts (for admin)

Configuration

  1. Navigate to SentinelSecurityREST APIAPI Protection
  2. Toggle each protection item on or off
  3. Configure rate limiting parameters
  4. Click Save

How User Enumeration Prevention Works

User enumeration prevention protects multiple attack vectors simultaneously.

Enumeration MethodCountermeasure
/wp/v2/usersBlock the endpoint entirely
?author=1, ?author=2...Disable Author Archives redirect
oEmbedRemove author name from responses
RSS FeedRemove author information from feeds
This makes it significantly harder for attackers to identify usernames, greatly reducing the effectiveness of brute-force attacks.

Compatibility with Gutenberg and Plugins

Even with API Protection enabled, API requests from authenticated users (such as logged-in administrators) are not restricted.

  • Gutenberg Editor: Works normally (authenticated requests are allowed)
  • WooCommerce REST API: Works normally (authenticated requests)
  • Contact Form 7: Works normally
  • Jetpack: Some features may be limited if XML-RPC is disabled

Notes

  • If you use applications that rely on XML-RPC (such as legacy mobile apps), carefully consider before disabling XML-RPC
  • Rate limiting also applies to legitimate high-volume API requests (such as bulk imports). Adjust the settings if you need to temporarily lift restrictions