The Banhammer – Monitor Site Traffic, Block Bad Users and Bots plugin for WordPress is vulnerable to Blocking Bypass in all versions up to, and including, 3.4.8. This is due to a site-wide “secret key” being deterministically generated from a constant character set using md5() and base64_encode() and then stored in the `banhammer_secret_key` option. This makes it possible for unauthenticated attackers to bypass the plugin’s logging and blocking by appending a GET parameter named `banhammer-process_{SECRET}` where `{SECRET}` is the predictable value, thereby causing Banhammer to abort its protections for that request.
References
Configurations
No configuration.
History
26 Sep 2025, 04:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-09-26 04:15
Updated : 2025-09-26 14:32
NVD link : CVE-2025-10745
Mitre link : CVE-2025-10745
CVE.ORG link : CVE-2025-10745
JSON object : View
Products Affected
No product.
CWE
CWE-330
Use of Insufficiently Random Values