Skip to content


This implements a simple firewall for CiviCRM that blocks by IP address in various scenarios.



Configure via Administer->System Settings->Firewall Settings


Scheduled Jobs


This job automatically removes old entries from the civicrm_firewall_ipaddress table after 1 month.

  • Run: Daily
  • Domain-specific: No. This job only needs to be run on one of the domains for multisite/multidomain setup.

If this job is not running then the civicrm_firewall_ipaddress table will gradually increase in size.


CSRF validity

  • There is a hidden setting firewall_csrf_timeout (default 43200 (12 hours)) that controls how long generated CSRF tokens are valid for. This accepts an integer number of seconds.


Fraud Events

You can trigger a Fraud Event by calling:

\Civi\Firewall\Event\FraudEvent::trigger([ip address], "my helpful description");

If 5 or more fraud events from the same IP address are triggered within 2 hours the IP address will be blocked for 2 hours. Once the number of fraud events in a 2 hour period drop below 5 the IP address will be automatically unblocked again.

Invalid CSRF Events

If you implement APIs or AJAX endpoints which require anonymous access (eg. a javascript based payment processor such as Stripe) then you will probably need to protect them with a CSRF token.

First get a token and pass it to your form/endpoint:

$myVars = [
  'token' => class_exists('\Civi\Firewall\Firewall') ? \Civi\Firewall\Firewall::getCSRFToken() : NULL,


$firewall = new \Civi\Firewall\Firewall();
$token = $firewall->generateCSRFToken();

Then in your API/AJAX endpoint check if the token is valid:

if (class_exists('\Civi\Firewall\Firewall')) {
  $firewall = new \Civi\Firewall\Firewall();
  if (!$firewall->checkIsCSRFTokenValid(CRM_Utils_Request::retrieveValue('token', 'String'))) {

!!! Note: By checking if the class exists the firewall extension can be an optional dependency.

Future Development / Ideas

Thanks to @artfulrobot for testing and writing down some ideas for future development.

  • Some forensic logging of bad things happening would be good. Who made the request, why was it bad, what was the content of the request, what was the user agent and the http method, were they logged in (!) - and as which user, is there any other relevant context? This way sites can use that data to be clevererer with setting limits/identifying traits of spammers.
  • All rates/limits should be configurable (limit and period per event; how long logs are kept for).
  • csrf tokens could include time limits and getter / checker could also take a param for the purpose - so one token doesn't work across different forms/purposes. Is there an advantage to tying in the IP to the token, too? I know you said this could come later.
  • I like the idea that we could use it for more stuff, like thwarting other form submission spam.
  • Also, should we log when we've denied someone something? I know there's the server logs with 403s. Just thinking that when I've been in this sort of situation, you can never get enough information. e.g. if it's baddies: need to study their behaviour; if it's goodies getting frustrated, good to understand what happened there, too, as it may help solve a supporter relations issue.

Currently the records are kept in the database table for one month. So you can work out when an IP was blocked - but it does require a bit of calculation.

Support and Maintenance

This extension is supported and maintained with the help and support of the CiviCRM community by:

MJW Consulting

We offer paid support and development as well as a troubleshooting/investigation service.