Описание
The Banhammer – Monitor Site Traffic, Block Bad Users and Bots plugin for WordPress is vulnerable to Blocking Bypass in all versions up to, and including, 3.4.8. This is due to a site-wide “secret key” being deterministically generated from a constant character set using md5() and base64_encode() and then stored in the banhammer_secret_key option. This makes it possible for unauthenticated attackers to bypass the plugin’s logging and blocking by appending a GET parameter named banhammer-process_{SECRET} where {SECRET} is the predictable value, thereby causing Banhammer to abort its protections for that request.
The Banhammer – Monitor Site Traffic, Block Bad Users and Bots plugin for WordPress is vulnerable to Blocking Bypass in all versions up to, and including, 3.4.8. This is due to a site-wide “secret key” being deterministically generated from a constant character set using md5() and base64_encode() and then stored in the banhammer_secret_key option. This makes it possible for unauthenticated attackers to bypass the plugin’s logging and blocking by appending a GET parameter named banhammer-process_{SECRET} where {SECRET} is the predictable value, thereby causing Banhammer to abort its protections for that request.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2025-10745
- https://plugins.trac.wordpress.org/browser/banhammer/trunk/inc/banhammer-core.php#L101
- https://plugins.trac.wordpress.org/browser/banhammer/trunk/inc/banhammer-functions.php#L336
- https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3365087%40banhammer&new=3365087%40banhammer&sfp_email=&sfph_mail=
- https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3365979%40banhammer&new=3365979%40banhammer&sfp_email=&sfph_mail=
- https://www.wordfence.com/threat-intel/vulnerabilities/id/97c46a13-6981-426f-b24a-c9820657042f?source=cve
Связанные уязвимости
The Banhammer – Monitor Site Traffic, Block Bad Users and Bots plugin for WordPress is vulnerable to Blocking Bypass in all versions up to, and including, 3.4.8. This is due to a site-wide “secret key” being deterministically generated from a constant character set using md5() and base64_encode() and then stored in the `banhammer_secret_key` option. This makes it possible for unauthenticated attackers to bypass the plugin’s logging and blocking by appending a GET parameter named `banhammer-process_{SECRET}` where `{SECRET}` is the predictable value, thereby causing Banhammer to abort its protections for that request.