Home

Description

The Banhammer – Monitor Site Traffic, Block Bad Users and Bots plugin for WordPress is vulnerable to Blocking Bypass in all versions up to, and including, 3.4.8. This is due to a site-wide “secret key” being deterministically generated from a constant character set using md5() and base64_encode() and then stored in the `banhammer_secret_key` option. This makes it possible for unauthenticated attackers to bypass the plugin’s logging and blocking by appending a GET parameter named `banhammer-process_{SECRET}` where `{SECRET}` is the predictable value, thereby causing Banhammer to abort its protections for that request.

PUBLISHED Reserved 2025-09-19 | Published 2025-09-26 | Updated 2025-09-26 | Assigner Wordfence




MEDIUM: 5.3CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

Problem types

CWE-330 Use of Insufficiently Random Values

Product status

Default status
unaffected

*
affected

Timeline

2025-09-19:Vendor Notified
2025-09-25:Disclosed

Credits

Jonas Benjamin Friedli finder

References

www.wordfence.com/...-6981-426f-b24a-c9820657042f?source=cve

plugins.trac.wordpress.org/...nk/inc/banhammer-functions.php

plugins.trac.wordpress.org/...r/trunk/inc/banhammer-core.php

plugins.trac.wordpress.org/...anhammer&sfp_email=&sfph_mail=

plugins.trac.wordpress.org/...anhammer&sfp_email=&sfph_mail=

cve.org (CVE-2025-10745)

nvd.nist.gov (CVE-2025-10745)

Download JSON