CVE-2025-10745
📋 TL;DR
This vulnerability allows unauthenticated attackers to bypass the Banhammer WordPress plugin's traffic monitoring and blocking features. Attackers can predict a secret key and append it as a GET parameter to avoid detection and blocking. All WordPress sites using Banhammer plugin versions up to 3.4.8 are affected.
💻 Affected Systems
- Banhammer – Monitor Site Traffic, Block Bad Users and Bots WordPress plugin
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Malicious actors can bypass all traffic monitoring and blocking, allowing DDoS attacks, brute force attempts, and malicious bot traffic to go undetected and unblocked.
Likely Case
Attackers bypass logging and blocking to conduct reconnaissance, scraping, or low-volume attacks without triggering security alerts.
If Mitigated
With proper monitoring and layered security controls, impact is limited to loss of this specific plugin's protection while other security measures remain effective.
🎯 Exploit Status
Exploitation requires predicting the secret key, which is deterministically generated using md5() and base64_encode() from a constant character set.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 3.4.9 or later
Vendor Advisory: https://plugins.trac.wordpress.org/browser/banhammer/trunk/readme.txt
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find Banhammer plugin. 4. Click 'Update Now' if available. 5. Alternatively, download version 3.4.9+ from WordPress plugin repository and manually update.
🔧 Temporary Workarounds
Disable Banhammer Plugin
WordPressTemporarily disable the vulnerable plugin until patched
wp plugin deactivate banhammer
Web Application Firewall Rule
allBlock requests containing 'banhammer-process_' parameter
🧯 If You Can't Patch
- Disable the Banhammer plugin immediately
- Implement alternative traffic monitoring/blocking solution like Wordfence or Cloudflare WAF
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin → Plugins → Installed Plugins → Banhammer version. If version is 3.4.8 or lower, you are vulnerable.
Check Version:
wp plugin get banhammer --field=version
Verify Fix Applied:
Verify Banhammer plugin version is 3.4.9 or higher in WordPress admin panel.
📡 Detection & Monitoring
Log Indicators:
- HTTP requests with 'banhammer-process_' parameter in query string
- Sudden drop in Banhammer blocking events while traffic remains high
Network Indicators:
- GET requests with 'banhammer-process_' parameter
- Traffic patterns bypassing expected blocking rules
SIEM Query:
http.uri_query CONTAINS "banhammer-process_"
🔗 References
- https://plugins.trac.wordpress.org/browser/banhammer/trunk/inc/banhammer-core.php#L101
- https://plugins.trac.wordpress.org/browser/banhammer/trunk/inc/banhammer-functions.php#L336
- https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3365087%40banhammer&new=3365087%40banhammer&sfp_email=&sfph_mail=
- https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3365979%40banhammer&new=3365979%40banhammer&sfp_email=&sfph_mail=
- https://www.wordfence.com/threat-intel/vulnerabilities/id/97c46a13-6981-426f-b24a-c9820657042f?source=cve