4.7 Block URL Requests
📘 Overview
The Block Request module allows you to block HTTP requests based on specific key-value matches found in either query strings (GET) or form data (POST). This helps prevent suspicious or unwanted data from reaching your application.
🛠️ How It Works
You define two simple parameters:
Request Key Value – The name of the request parameter to monitor (e.g.,
search
,token
,redirect
)Request Content – The exact value that should be blocked (e.g.,
SELECT
,javascript:
,admin
)
If the system detects a request with that key and matching value, it blocks the request immediately.
⚙️ How to Add a Blocking Rule
Go to Security Rules > Block URL Request Parameters
Click Block Request
Fill in:
Enter Request Key Value
: the parameter name to inspectEnter Request Content
: the value to block
Click Block
The rule is now active and will block matching requests
📋 Example Use Cases
Block
search=SELECT
to prevent SQL Injection attemptsBlock
redirect=javascript:
to mitigate Open RedirectsBlock
token=admin123
to prevent brute-force token usage
🔐 Why It Matters
By inspecting incoming request parameters, this feature allows early detection of payload-based attacks. It helps reduce exposure to:
SQL Injection (SQLi)
Cross-Site Scripting (XSS)
Command Injection
Open Redirects
🎯 Blocking malicious key-value combinations at the request level helps neutralize attacks before they reach your backend systems.
Last updated