@cbrandt – thanks for the input and encouragement!
I performed the action as suggested. The event service is Managed Rules, with additional detail as follows.
- Ruleset: Cloudflare OWASP Core Ruleset
- Rule: 949110: Inbound Anomaly Score Exceeded
- OWASP score: 61
Then the additional logs of this event listed further below. Earlier today, I created a rule to allow the office IP to bypass the managed rules, and that allowed me to get the plugin uploaded, and to export orders. So I disabled it for this test. But an IP rule isn’t a practical solution. The WP Cloudflare plugin settings seem to be irrelevant now, but at least the WAF seems to be working, albeit to agressively.
932100: Remote Command Execution: Unix Command Injection
Cloudflare OWASP Core Ruleset Score (+5)
932200: RCE Bypass Technique
Cloudflare OWASP Core Ruleset Score (+5)
933151: PHP Injection Attack: Medium-Risk PHP Function Name Found
Cloudflare OWASP Core Ruleset Score (+5)
942110: SQL Injection Attack: Common Injection Testing Detected
Cloudflare OWASP Core Ruleset Score (+3)
942200: Detects MySQL comment-/space-obfuscated injections and backtick termination
Cloudflare OWASP Core Ruleset Score (+5)
942260: Detects basic SQL authentication bypass attempts 2/3
Cloudflare OWASP Core Ruleset Score (+5)
942300: Detects MySQL comments, conditions and ch(a)r injections
Cloudflare OWASP Core Ruleset Score (+5)
942330: Detects classic SQL injection probings 1/3
Cloudflare OWASP Core Ruleset Score (+5)
942340: Detects basic SQL authentication bypass attempts 3/3
Cloudflare OWASP Core Ruleset Score (+5)
942370: Detects classic SQL injection probings 2/3
Cloudflare OWASP Core Ruleset Score (+5)
942380: SQL Injection Attack
Cloudflare OWASP Core Ruleset Score (+5)
942430: Restricted SQL Character Anomaly Detection (args): # of special characters exceeded (12)
Cloudflare OWASP Core Ruleset Score (+3)
942440: SQL Comment Sequence Detected
Cloudflare OWASP Core Ruleset Score (+5)