Hi Jeroen,
I managed to solve the issue – it was connected to the server firewall. Switching it off allowed me to generate the codes successfully.
I am attaching the server logs in case you want to review the plugin and make some improvements, since it was not the first time someone had a similar problem:
80.136.160.97 – – [05/Apr/2018:14:26:55 +0200] “POST /de/wp-admin/admin.php?page=woocommerce_coupon_generator&step=2 HTTP/1.1” 403 230 “https://napogloves.com/de/wp-admin/admin.php?page=woocommerce_coupon_generator&step=2” “Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_3) AppleWebKit/604.5.6 (KHTML, like Gecko) Version/11.0.3 Safari/604.5.6” 3285 597 26745 -% 10196 – – – DE 3026 0 0 5 0 0 0 5
[Thu Apr 05 14:26:55.197588 2018] [:error] [pid 26745] [client 80.136.160.97:61817] [client 80.136.160.97] ModSecurity: Access denied with code 403 (phase 2). Pattern match “[\\\\[\\\\]\
\\\x22′,()\\\\.]{10}$|(?:union\\\\s+all\\\\s+select\\\\s+(?:(?:null|\\\\d+),?)+|order\\\\s+by\\\\s+\\\\d{1,4}|(?:and|or)\\\\s+\\\\d{4}=\\\\d{4}|waitfor\\\\s+delay\\\\s+’\\\\d+:\\\\d+:\\\
\d+’|(?:select|and|or)\\\\s+(?:(?:pg_)?sleep\\\\(\\\\d+\\\\)|\\\\d+\\\\s*=\\\\s*(?:dbms_pipe\\\\.receive_mes …” at ARGS:_wp_http_referer. [file “/home/tools/global/various/CWAF/rules/2
4_SQL_SQLi.conf”] [line “67”] [id “218500”] [rev “7”] [msg “COMODO WAF: SQLmap attack detected||napogloves.com|F|2”] [data “Matched Data: or&step=2 found within ARGS:_wp_http_referer: /d
e/wp-admin/admin.php?page=woocommerce_coupon_generator&step=2”] [severity “CRITICAL”] [tag “CWAF”] [tag “SQLi”] [hostname “napogloves.com”] [uri “/de/wp-admin/admin.php”] [unique_id “WsY
WD8PyXAgAAGSGkH4AAAAY”], referer: https://napogloves.com/de/wp-admin/admin.php?page=woocommerce_coupon_generator&step=2
Thanks for your help!
Greetings,
Martin