Home

Description

The Login Lockdown & Protection plugin for WordPress is vulnerable to IP Block Bypass in all versions up to, and including, 2.14. This is due to $unblock_key key being insufficiently random allowing unauthenticated users, with access to an administrative user email, to generate valid unblock keys for their IP Address. This makes it possible for unauthenticated attackers to bypass blocks due to invalid login attempts.

PUBLISHED Reserved 2025-10-13 | Published 2025-12-13 | Updated 2025-12-15 | Assigner Wordfence




MEDIUM: 5.3CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

Problem types

CWE-330 Use of Insufficiently Random Values

Product status

Default status
unaffected

* (semver)
affected

Timeline

2025-12-12:Disclosed

Credits

William Cooke finder

References

www.wordfence.com/...-0263-4b18-9aa4-29e387b26362?source=cve

plugins.trac.wordpress.org/...kdown/trunk/libs/functions.php

plugins.trac.wordpress.org/...lockdown&sfp_email=&sfph_mail=

cve.org (CVE-2025-11707)

nvd.nist.gov (CVE-2025-11707)

Download JSON

Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.