The Login Lockdown & Protection plugin for WordPress is vulnerable to IP Block Bypass in all versions up to, and including, 2.14. This is due to $unblock_key key being insufficiently random allowing unauthenticated users, with access to an administrative user email, to generate valid unblock keys for their IP Address. This makes it possible for unauthenticated attackers to bypass blocks due to invalid login attempts.
References
Configurations
No configuration.
History
13 Dec 2025, 16:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-12-13 16:16
Updated : 2025-12-15 18:22
NVD link : CVE-2025-11707
Mitre link : CVE-2025-11707
CVE.ORG link : CVE-2025-11707
JSON object : View
Products Affected
No product.
CWE
CWE-330
Use of Insufficiently Random Values
