Skip to content

Changelog

New updates and improvements at Cloudflare.

All products
hero image
  1. Full Changelog: v6.0.0-beta.2...v6.0.0

    This is a major version release of the Cloudflare TypeScript SDK. It includes 11 entirely new top-level API resources, new sub-resources and methods across 50+ existing resources, SDK infrastructure improvements, and breaking changes to the generated API surface from the v5.x line.

    Please ensure you read through the list of changes below before moving to this version - this will help you understand any down or upstream issues it may cause to your environments.

    Breaking Changes

    SDK Infrastructure

    • Retry-After handling changed: The SDK now respects any server-specified Retry-After value for rate-limited requests. Previously, values over 60 seconds were ignored and a default backoff was used instead.
    • Empty response handling: Responses with content-length: 0 now return undefined instead of attempting to parse the body.
    • Environment variable reading: Empty string env vars (for example, CLOUDFLARE_API_TOKEN="") are now treated as unset.
    • Path query parameter merging: URL search params embedded in endpoint paths are now extracted and merged into the query object.

    Removed Endpoints (17)

    17 HTTP endpoints were removed from the SDK, affecting abuse-reports, cloudforce-one, dlp/profiles/predefined, email-security/investigate, email-security/settings, and intel/ip-list.

    Method Signature Changes

    • client.ai.toMarkdown.transform(file, \{ ...params \}) -> client.ai.toMarkdown.transform(\{ ...params \}) -- file moved from positional arg into params body
    • client.radar.ai.toMarkdown.create(body, \{ ...params \}) -> client.radar.ai.toMarkdown.create(\{ ...params \}) -- body moved from positional arg into params
    • client.abuseReports.create(reportType, \{ ...params \}) -> client.abuseReports.create(reportParam, \{ ...params \}) -- positional arg renamed
    • client.iam.userGroups.members.create(userGroupId, [ ...body ]) -> client.iam.userGroups.members.create(userGroupId, [ ...members ]) -- body array param renamed

    Renamed Client Paths

    • client.originTLSClientAuth.hostnames.certificates -> client.originTLSClientAuth.zoneCertificates
    • client.radar.netflows -> client.radar.netFlows (casing change)

    Return Type Changes (179)

    • 133 methods now return null instead of a typed response object. This primarily affects delete operations across accounts, cache, d1, filters, firewall, hyperdrive, iam, kv, logpush, logs, r2, stream, workers, zero-trust, zones, and others.
    • 17 methods changed pagination type (for example, KeysCursorPaginationAfter -> KeysCursorLimitPagination).
    • 29 methods changed to a different named type (for example, CloudflaredCreateResponse -> CloudflareTunnel).

    Removed Types (43)

    24 shared types removed from root namespace (ASN, AuditLog, Member, Permission, Role, Subscription, Token, etc.). 19 response types consolidated or renamed.

    Resource Restructuring

    19 resources were restructured from single files to directories. Public API client paths are unchanged, but deep imports may break.

    New Top-Level Resources

    11 entirely new resources added to the client:

    ResourceClient PathMethodsDescription
    AI Searchclient.aiSearch46Instances, namespaces, tokens, and items
    Connectivityclient.connectivity5Directory service APIs
    Email Sendingclient.emailSending7Send and send_raw endpoints
    Fraudclient.fraud2Fraud detection API
    Google Tag Gatewayclient.googleTagGateway2Google Tag Gateway management
    Organizationsclient.organizations8Organization profiles and audit logs
    R2 Data Catalogclient.r2DataCatalog11R2 Data Catalog routes
    Realtime Kitclient.realtimeKit54Realtime Kit APIs
    Resource Taggingclient.resourceTagging9Resource tagging routes
    Token Validationclient.tokenValidation13Token validation rules
    Vulnerability Scannerclient.vulnerabilityScanner21Vulnerability scanning

    New Sub-Resources on Existing Resources

    • browser-rendering: crawl, devtools - Crawl endpoints and DevTools methods
    • cache: origin-cloud-regions - Origin cloud regions resource
    • dns: usage - DNS records usage endpoints
    • d1: time-travel - Time travel get_bookmark and restore
    • email-security: phishguard - Phishguard reports endpoint
    • pipelines: sinks, streams - Pipelines restructure
    • radar: agent-readiness, geolocations, post-quantum - New analytics endpoints
    • workers: observability - Observability destinations
    • zones: environments - Zone environments endpoints
    • api-gateway: labels - Labels endpoints
    • brand-protection: v2 - V2 endpoints
    • alerting: silences - Alert silencing API
    • billing: usage - Billable usage PayGo endpoint
    • iam: sso - SSO Connectors resource
    • queues: getMetrics method - Queues metrics endpoint
    • registrar: registration-status, update-status - Registrar API convergence
    • zero-trust: DLP settings, DEX rules, Access Users, WARP Connector, WARP Subnets, Gateway PAC files, Gateway tenants

    Bug Fixes

    • Resolved type errors from codegen overwriting manual fixes
    • Fixed post() usage for to-markdown endpoints to resolve async type error
    • Added least-privilege permissions to all workflow jobs
    • Reverted erroneous removal of rulesets resource methods and types
    • Resolved prettier formatting errors in codegen output

    Deprecations

    The following resources now include @deprecated annotations on some methods:

    accounts, addressing, ai-gateway, aisearch, api-gateway, billing, cloudforce-one, custom-nameservers, dns, email-routing, email-security, filters, firewall, images, intel, keyless-certificates, kv, logpush, origin-tls-client-auth, page-shield, pages, pipelines, radar, rate-limits, registrar, rulesets, ssl, user, workers, workers-for-platforms, zero-trust, zones

    Get started

  1. Shared dictionaries (RFC 9842) let an origin compress a response against a previous version of the same resource that the browser already has cached, so only the difference between versions travels over the wire. Shared dictionaries passthrough is now in open beta on all plans.

    What changed

    In passthrough mode, Cloudflare:

    • Forwards the Use-As-Dictionary and Available-Dictionary headers between client and origin without modification.
    • Treats dcb (Dictionary-Compressed Brotli) and dcz (Dictionary-Compressed Zstandard) as valid Content-Encoding values end to end, without recompressing them.
    • Extends the cache key to vary on Available-Dictionary and Accept-Encoding so each delta-compressed variant is cached correctly.

    Your origin manages the dictionary lifecycle: deciding which assets are dictionaries, attaching Use-As-Dictionary headers, and producing deltas in response to Available-Dictionary requests. Cloudflare handles the transport and the cache.

    In internal testing on a 272 KB JavaScript bundle, the asset shrinks from 92.1 KB with Gzip to 2.6 KB with delta Zstandard against the previous version — a 97% reduction over standard compression — with download times improving by 81–89% versus Gzip.

    Shared dictionaries work with browsers that advertise dcb or dcz in Accept-Encoding. Today, this includes Chrome 130 or later and Edge 130 or later.

    Get started

    Turn on passthrough for your zone with a single API call:

    Terminal window
    curl "https://api.cloudflare.com/client/v4/zones/$ZONE_ID/settings/shared_dictionary_mode" \
    --request PATCH \
    --header "Authorization: Bearer $CLOUDFLARE_API_TOKEN" \
    --json '{
    "value": "passthrough"
    }'

    You can also turn it on under Speed > Settings > Content Optimization in the Cloudflare dashboard. For full origin setup instructions and a working test recipe, refer to Shared dictionaries, or try the live demo at canicompress.com.

  1. This emergency release introduces a new rule to block a cPanel & WHM Authentication Bypass related to CVE-2026-41940.

    Key Findings

    • CVE-2026-41940: A critical authentication bypass vulnerability in cPanel & WHM allows unauthenticated remote attackers to bypass authentication mechanisms and gain unauthorized administrative access to the web hosting control panel. This vulnerability affects the session validation logic, enabling attackers to craft malicious requests that circumvent normal authentication checks.

    Impact

    Successful exploitation allows unauthenticated attackers to gain administrative control over affected cPanel & WHM installations. This leads to complete server compromise, potential theft or manipulation of hosted data, and significant service disruption across managed environments.

    We strongly recommend applying official vendor patches for cPanel & WHM immediately to address the underlying vulnerability.

    RulesetRule IDLegacy Rule IDDescriptionPrevious ActionNew ActionComments
    Cloudflare Managed Ruleset N/AcPanel - Auth Bypass - CVE:CVE-2026-41940N/ABlockThis is a new detection.
  1. Cloudflare Web Analytics now supports Navigation Type reporting and filtering.

    This update allows developers and performance analysts to see how users are navigating between pages — whether through a link click or form submission, a page reload, or using the browser's back/forward buttons — and whether a browser cache hit occurred for these behaviors.

    Understanding navigation types is critical for optimizing user experience. For example, if a high volume of your traffic consists of "Back-forward" navigations versus "Back-forward Cache", those visitors are not benefiting from the Back/Forward Cache (bfcache) and therefore are experiencing higher load times due to potentially unnecessary network requests.

    The same applies for regular "Navigate" entries — where "Navigate Cache", "Navigate Prefetch Cache" and "Prerender" would provide instant document retrieval — and "Reload", where "Reload cache" would be more optimal.

    A high volume of "Reload" entries can also indicate a potential stability problem with your website.

    By identifying these patterns, you can tune your browser caching strategies to ensure HTML documents are served instantaneously from local caches rather than requiring a roundtrip to the network.

    For more information, refer to Navigation Types.

    Key benefits

    • Monitor Cache Effectiveness: See how often your site is served from the HTTP cache or bfcache.
    • Identify Performance Bottlenecks: Filter by the different types to understand performance opportunity of improving browser cache hit ratio.

    Analyze navigation types in the Cloudflare dashboard

    You can now find the Navigation Type dimension in the Web Analytics dashboard. You can filter to include/exclude one or more specific types using "equals", "does not equal", "in", or "not in" matchers.

    Navigation Type filter

    To check the list of popular navigation types, select Page views on the Web Analytics sidebar and scroll down to the bottom:

    Navigation Types list in Page Views tab
  1. Digital experience tests now support testing applications protected by Cloudflare Access or third-party authentication. All authentication secrets are managed via Cloudflare Secret Store.

    Digital experience tests also have enhanced configuration options including:

    • New HTTP methods (DELETE, PATCH, POST, PUT)
    • Secret Store headers, custom plain text headers, and custom request bodies
    • Advanced settings: follow redirects, response bodies, response headers, and allow untrusted certificates
    Digital experience test configuration for Cloudflare Access applicationsDigital experience enhanced test configuration
  1. You can now pay for Cloudflare services directly from your bank account using Instant Bank Payments via Link.

    What changed

    Link now supports bank account payments in addition to cards. If you have a bank account saved in Link, it appears as a payment option at checkout. If not, you can connect one during the checkout flow.

    Instant Bank Payments via Link at checkout

    How to use it

    1. During checkout, select your bank account from your saved Link payment methods.
    2. Confirm the payment.

    After your first Link authentication, your bank account is available for future purchases without re-entering details.

    Who is eligible

    Instant Bank Payments via Link is available to US-based self-serve accounts across all Cloudflare products. Your existing cards remain available at checkout.

    Bank-based Link payments appear in your billing history with the payment method shown as link and last four digits as 0000. For details, refer to the Instant Bank Payments via Link documentation.

  1. The Gateway Authorization Proxy and hosted PAC files are now generally available for all plan types.

    Authorization proxy endpoints add an identity-aware option alongside the existing source IP proxy endpoints, using Cloudflare Access authentication to verify who a user is before applying Gateway filtering — without installing the Cloudflare One Client. Cloudflare-hosted PAC files let you create and distribute PAC files directly from Cloudflare One on Cloudflare's global network.

    These features are ideal for environments where deploying a device client is not an option, such as virtual desktops (VDI) or compliance-restricted endpoints.

    To get started, refer to the proxy endpoints documentation.

  1. You can now connect Hyperdrive to a private database through a Workers VPC service. This is the recommended way to connect Hyperdrive to a private database that is not exposed to the public Internet.

    When creating a Hyperdrive configuration in the Cloudflare dashboard, choose Connect to private database and then Workers VPC. From there, you can select an existing VPC service or create a new one inline by picking a Cloudflare Tunnel and entering your origin host and TCP port.

    You can also create a Hyperdrive configuration backed by a Workers VPC service from the command line:

    Terminal window
    npx wrangler hyperdrive create my-vpc-database \
    --service-id <YOUR_VPC_SERVICE_ID> \
    --database <DATABASE_NAME> \
    --user <DATABASE_USER> \
    --password <DATABASE_PASSWORD> \
    --scheme postgresql

    Workers VPC services are reusable across Hyperdrive configurations and can also be bound directly to Workers, so you can share the same private connection across multiple products.

    To get started, refer to Connect Hyperdrive to a private database using Workers VPC.

  1. Digital Experience will display a dashboard notification when an Internet outage or traffic anomaly may impact a Cloudflare One Client device based on its geographic location or network connection.

    This Internet outage and traffic anomaly data is pulled from Cloudflare Radar. All Internet outage and traffic anomaly observations can be viewed in the Radar Outage Center.

    Digital Experience Monitoring dashboard notification for Internet outage impacting Cloudflare One Client devicesDigital Experience Monitoring dashboard analytics for Internet outage impacting Cloudflare One Client devices
  1. IT teams can now remotely run speed tests from the Cloudflare One Client to Cloudflare's network edge.

    Each speed test includes the following metrics:

    • Internet speed: download and upload throughput
    • Latency: download, upload, unloaded latency, and jitter
    • Network quality score: video streaming, webchat/real-time communication (RTC)

    In the Cloudflare dashboard, go to Zero Trust > Insights > Digital experience > Diagnostics and select Run diagnostics to use the feature today.

    Cloudflare One client speed test result
  1. You can now create, view, and manage DLP detection entries outside of profiles.

    Detection entries are no longer hidden inside individual profiles. Administrators can manage detection entries directly from the Detection entries section and use them in custom DLP profiles.

    For more information, refer to Configure detection entries.

  1. Cloudflare DLP now includes a new predefined profile designed to detect PII records that contain multiple types of personal data: Personally Identifiable Information (PII) Record.

    Most predefined and custom DLP profiles match when any enabled detection entry matches. The Personally Identifiable Information (PII) Record profile is different. It only matches when at least three unique detection entries are found in close proximity, which reduces false positives from standalone values that may not represent a real PII record.

    Detection entries included in the profile:

    • AU Passport Number
    • American Express Card Number
    • Diners Club Card Number
    • US Driver's License Number
    • Email Address
    • Full Name
    • US Mailing Address
    • Mastercard Card Number
    • US Individual Tax Identification Number (ITIN)
    • US Passport Number
    • US Phone Number
    • Union Pay Card Number
    • United States SSN Numeric Detection
    • Visa Card Number

    For more information, refer to predefined DLP profiles.

  1. You can now disable Cloudflare's reverse proxy across all zones in your account simultaneously using the new enforce_dns_only setting. When enabled, Cloudflare responds to DNS queries for all proxied records with your origin IP addresses instead of Cloudflare's anycast IPs. This account-level kill switch is designed for incident response scenarios where you need to quickly route traffic directly to your origin servers.

    Key characteristics

    • Account-level — Affects all zones in the account simultaneously with a single API call.
    • Non-destructive — Does not modify your DNS records. Disabling the setting restores normal proxy behavior.
    • API-only — Available through the API only, not in the Cloudflare dashboard.

    What's affected

    Included: Standard proxied A, AAAA, and CNAME records, Load Balancing records, and records matching Worker routes.

    Excluded: Spectrum applications, Cloudflare Tunnel CNAMEs, R2 custom domains, Web3 gateways, and Workers custom domains continue to operate normally.

    Before you enable

    • Verify your origin servers can handle direct traffic without Cloudflare's caching and filtering.
    • Review which origin IPs will become publicly visible through DNS queries.
    • Test the API in a staging account before relying on it for incident response.

    Availability

    Available via API to all Cloudflare customers.

    For information on how to use it, refer to Enforce DNS-only developer documentation .

  1. Queues, Cloudflare's managed message queue, now exposes realtime backlog metrics via the dashboard, REST API, and JavaScript API. Three new fields are available:

    • backlog_count — the number of unacknowledged messages in the queue
    • backlog_bytes — the total size of those messages in bytes
    • oldest_message_timestamp_ms — the timestamp of the oldest unacknowledged message

    The following endpoints also now include a metadata.metrics object on the result field after successful message consumption:

    • /accounts/{account_id}/queues/{queue_id}/messages/pull
    • /accounts/{account_id}/queues/{queue_id}/messages
    • /accounts/{account_id}/queues/{queue_id}/messages/batch

    Javascript APIs

    Call env.QUEUE.metrics() to get realtime backlog metrics:

    TypeScript
    const {
    backlogCount, // number
    backlogBytes, // number
    oldestMessageTimestamp, // Date | undefined
    } = await env.QUEUE.metrics();

    env.QUEUE.send() and env.QUEUE.sendBatch() also now return a metrics object on the response.

    You can also query these fields via the GraphQL Analytics API or view realtime backlog on the dashboard.

    Queues realtime backlog

    For more information, refer to Queues metrics.

  1. Direct access to Support from the dashboard

    The Support button in the dashboard global navigation header now takes you directly to the Cloudflare Support Portal, eliminating the previous dropdown menu.

    This change ensures that when you need help, you spend less time navigating the UI and more time getting the answers you need.

    What changed?

    • Previous behavior: Selecting ? Support opened a dropdown menu with various links (Help Center, Cloudflare Community, etc.).
    • New behavior: Selecting Support immediately redirects your current tab to the Support Portal.

    To learn more about the resources available to you, refer to the Cloudflare Support documentation.

  1. Cache Response Rules now work with Version Management. You can version response-phase cache settings and promote them through environments, just like Cache Rules and other supported configurations.

    What changed

    Previously, Cache Response Rules were excluded from zone versioning. Any response-phase rule you created applied globally across all environments with no way to test changes in staging first. Cache Rules already supported versioning, but the response phase, where you modify Cache-Control directives, manage cache tags, and strip headers, did not.

    Cache Response Rules are now fully integrated with Version Management. You can create or modify response-phase rules within a version, and those changes stay scoped to that version until promoted.

    Benefits

    • Safe rollout of cache behavior changes: Test response-phase rules in a staging environment before promoting to production. Catch unintended caching side effects early.
    • Parity with Cache Rules: Cache Response Rules now follow the same versioning workflow as Cache Rules, so you can manage all cache configuration through a single promotion pipeline.
    • Independent environment control: Run different response-phase cache settings per environment. For example, strip Set-Cookie headers in staging to validate cacheability without affecting production traffic.

    Get started

    Configure Cache Response Rules in the Cloudflare dashboard under Caching > Cache Rules, or via the Rulesets API. For more details, refer to the Cache Response Rules documentation and the Version Management documentation.

  1. Cloudflare-generated 5xx error responses now return structured JSON and Markdown when agents request them, matching the format already available for 1xxx errors. Responses follow RFC 9457 (Problem Details for HTTP APIs) and include a Retry-After HTTP header on retryable codes.

    Changes

    5xx coverage. Ten Cloudflare-generated error codes (500, 502, 504, 520-526) now serve structured responses. These are errors Cloudflare itself generates when it cannot reach or understand the origin server. Origin-generated 5xx responses that Cloudflare passes through are not affected.

    Fault attribution. The error_category field tells agents where the fault lies:

    • origin (502, 504, 520-524) — the origin server is responsible. Transient; retry with the backoff in retry_after.
    • cloudflare (500) — Cloudflare's fault, not the website or the request. Short retry.
    • ssl (525, 526) — the origin's TLS configuration is broken. Do not retry.

    Retry-After header. Retryable codes (500, 502, 504, 520-524) include a Retry-After HTTP header matching the retry_after body field. Non-retryable codes (525, 526) do not include the header.

    Negotiation behavior

    Request header sentResponse format
    Accept: application/jsonJSON (application/json content type)
    Accept: application/problem+jsonJSON (application/problem+json content type)
    Accept: application/json, text/markdown;q=0.9JSON
    Accept: text/markdownMarkdown
    Accept: text/markdown, application/jsonMarkdown (equal q, first-listed wins)
    Accept: */*HTML (default)

    Availability

    Available now for all zones on all plans.

    Get started

    Get JSON response for error 522:

    Terminal window
    curl -s --compressed -H "Accept: application/json" -A "TestAgent/1.0" -H "Accept-Encoding: gzip, deflate" "<YOUR_DOMAIN>/cdn-cgi/error/522" | jq .

    Check presence of the Retry-After HTTP header associated with the JSON response for error 521:

    Terminal window
    curl -s --compressed -D - -o /dev/null -H "Accept: application/json" -A "TestAgent/1.0" -H "Accept-Encoding: gzip, deflate" "<YOUR_DOMAIN>/cdn-cgi/error/521" | grep -i retry-after

    References:

  1. Resource Tagging is now in public beta and rolling out to all Cloudflare accounts over the coming days. You can attach custom key-value metadata to your Cloudflare resources and query across your entire account to find what you need.

    What's included

    • Broad resource type support — Tag zones, custom hostnames, Cloudflare Tunnels, Workers, D1 databases, R2 buckets, KV namespaces, Durable Object namespaces, Queues, Stream videos, Images, Access applications, Gateway rules, AI Gateways, and more. Refer to the full list of supported resource types.
    • Powerful filtering — Query tagged resources using AND/OR logic, negation, and key-only matching. Combine up to 20 filters per query to build precise resource views.
    • Account and zone-level endpoints — Full CRUD operations across both scopes.
    • Token-based authentication — Tagging supports Account Owned Tokens that persist independently of individual users, so your automation keeps running through credential rotations and team changes.
    • Flexible role support — Super Administrators, Workers Admins, and Tag Admins can all manage tags.

    API-first by design

    The API is the primary interface for Resource Tagging and the recommended path for all workflows — scripting tag assignments, building CI/CD pipelines, or integrating with your infrastructure-as-code toolchain.

    Dashboard UI

    You can also view and manage tagged resources directly in the Cloudflare dashboard. Navigate to Manage Account > Resource Tagging to see all tagged resources across your account, filter by resource name or tag, and add or edit tags inline.

    Tagged Resources dashboard

    What's coming next

    In future releases, expect support for additional resource types across the Cloudflare platform, tag-based access control policies for scoping user permissions to tagged resources, billing and usage attribution by tag for breaking down costs by team, project, or environment, and Terraform provider support for managing tags declaratively.

    Current limitations

    • PUT replaces all tags on a resource (no partial update). Use the GET, merge, PUT workflow to modify individual tags safely.
    • DELETE removes all tags from a resource. To remove a single tag, PUT the remaining tags back.
    • Querying tags for a resource that has never been tagged returns 500 instead of 404. This is a known beta limitation.

    To get started, refer to the Resource Tagging documentation.

  1. We have introduced a unified investigation workspace within Brand Protection to help analysts manage complex brand portfolios. Instead of jumping between individual queries, you can now consolidate your workflow into a single, cohesive view.

    What's new

    • You can now elect multiple saved queries from your dashboard to generate a consolidated "Combined Matches" view. This allows you to triage results from different brand queries in one unified table
    • You can open query extended views in distinct tabs within the Brand Protection dashboard. This enables you to maintain multiple investigation contexts simultaneously and switch between them without losing your place.
    • You can reset your workspace using the new "Clear Selection" action, making it easier to pivot between different investigation sets.

    Key benefits

    • Eliminate fragmented workflows by viewing all matches across different query buckets in a single table, reducing the need to click through dozens of individual query pages
    • Correlate related campaigns by seeing similar domains or infrastructure patterns that appear across multiple saved queries

    Learn more in our Brand Protection documentation.

  1. This week's release focuses on new improvements to enhance coverage.

    Key Findings

    • Existing rule enhancements have been deployed to improve detection resilience against broad classes of web attacks and strengthen behavioral coverage.

    Continuous Rule Improvements

    We are continuously refining our managed rules to provide more resilient protection and deeper insights into attack patterns. To ensure an optimal security posture, we recommend consistently monitoring the Security Events dashboard and adjusting rule actions as these enhancements are deployed.

    RulesetRule IDLegacy Rule IDDescriptionPrevious ActionNew ActionComments
    Cloudflare Managed Ruleset N/APostgreSQL - SQLi - COPY - BetaLogBlock

    This is a new detection. This rule is merged into the original rule "PostgreSQL - SQLi - COPY - Body (ID: ). The rule previously known as "PostgreSQL - SQLi - COPY" is now renamed to "PostgreSQL - SQLi - COPY - Body".

    Cloudflare Managed Ruleset N/APostgreSQL - SQLi - COPY - HeadersLogBlockThis is a new detection.
    Cloudflare Managed Ruleset N/APostgreSQL - SQLi - COPY - URILogBlockThis is a new detection.
    Cloudflare Managed Ruleset N/ASQLi - AND/OR MAKE_SET/ELT - BetaLogBlock

    This is a new detection. This rule is merged into the original rule "SQLi - AND/OR MAKE_SET/ELT - Body" (ID: ). The rule previously known as "SQLi - AND/OR MAKE_SET/ELT" is now renamed to "SQLi - AND/OR MAKE_SET/ELT - Body".

    Cloudflare Managed Ruleset N/ASQLi - AND/OR MAKE_SET/ELT - HeadersLogBlockThis is a new detection.
    Cloudflare Managed Ruleset N/ASQLi - AND/OR MAKE_SET/ELT - URILogBlockThis is a new detection.
    Cloudflare Managed Ruleset N/ASQLi - Common Patterns - BetaLogBlock

    This is a new detection. This rule is merged into the original rule "SQLi - Common Patterns - Body" (ID: ). The rule previously known as "SQLi - Common Patterns" is now renamed to "SQLi - Common Patterns - Body".

    Cloudflare Managed Ruleset N/ASQLi - Common Patterns - HeadersLogBlockThis is a new detection.
    Cloudflare Managed Ruleset N/ASQLi - Common Patterns - URILogBlockThis is a new detection.
    Cloudflare Managed Ruleset N/ASQLi - Equation - BetaLogBlock

    This is a new detection. This rule is merged into the original rule "SQLi - Equation - Body" (ID: ). The rule previously known as "SQLi - Equation" is now renamed to "SQLi - Equation - Body".

    Cloudflare Managed Ruleset N/ASQLi - Equation - HeadersLogBlockThis is a new detection.
    Cloudflare Managed Ruleset N/ASQLi - Equation - URILogBlockThis is a new detection.
    Cloudflare Managed Ruleset N/ASQLi - AND/OR Digit Operator Digit - BetaLogBlock

    This is a new detection. This rule is merged into the original rule "SQLi - AND/OR Digit Operator Digit - Body" (ID: ). The rule previously known as "SQLi - AND/OR Digit Operator Digit" is now renamed to "SQLi - AND/OR Digit Operator Digit - Body".

    Cloudflare Managed Ruleset N/ASQLi - AND/OR Digit Operator Digit - HeadersLogBlockThis is a new detection.
    Cloudflare Managed Ruleset N/ASQLi - AND/OR Digit Operator Digit - URILogBlockThis is a new detection.
    Cloudflare Managed Ruleset N/ASQLi - Benchmark Function - BetaLogBlock

    This is a new detection. This rule is merged into the original rule "SQLi - Benchmark Function - Body" (ID: ). The rule previously known as "SQLi - Benchmark Function" is now renamed to "SQLi - Benchmark Function - Body".

    Cloudflare Managed Ruleset N/ASQLi - Benchmark Function - HeadersLogBlockThis is a new detection.
    Cloudflare Managed Ruleset N/ASQLi - Benchmark Function - URILogBlockThis is a new detection.
    Cloudflare Managed Ruleset N/ASQLi - Comparison - BetaLogBlock

    This is a new detection. This rule is merged into the original rule "SQLi - Comparison - Body" (ID: ). The rule previously known as "SQLi - Comparison" is now renamed to "SQLi - Comparison - Body".

    Cloudflare Managed Ruleset N/ASQLi - Comparison - HeadersLogBlockThis is a new detection.
    Cloudflare Managed Ruleset N/ASQLi - Comparison - URILogBlockThis is a new detection.
    Cloudflare Managed Ruleset N/ASQLi - String Concatenation - Body - BetaLogBlockThis is a new detection. This rule is merged into the original rule "SQLi - String Concatenation - Headers" (ID: ).The rule previously known as "SQLi - String Concatenation - Headers" is now renamed to "SQLi - String Concatenation - Body".
    Cloudflare Managed Ruleset N/ASQLi - String Concatenation - HeadersLogBlockThis is a new detection.(Former Id was )
    Cloudflare Managed Ruleset N/ASQLi - String Concatenation - URILogBlockThis is a new detection. (Former Id was )
    Cloudflare Managed Ruleset N/ASQLi - SELECT Expression - BetaLogBlock

    This is a new detection. This rule is merged into the original rule "SQLi - SELECT Expression - Body" (ID: ). The rule previously known as "SQLi - SELECT Expression" is now renamed to "SQLi - SELECT Expression - Body".

    Cloudflare Managed Ruleset N/ASQLi - SELECT Expression - HeadersLogBlockThis is a new detection.
    Cloudflare Managed Ruleset N/ASQLi - SELECT Expression - URILogBlockThis is a new detection.
    Cloudflare Managed Ruleset N/ASQLi - ORD and ASCII - BetaLogBlock

    This is a new detection. This rule is merged into the original rule "SQLi - ORD and ASCII- Body" (ID: ). The rule previously known as "SQLi - ORD and ASCII" is now renamed to "SQLi - ORD and ASCII- Body".

    Cloudflare Managed Ruleset N/ASQLi - ORD and ASCII - URILogBlockThis is a new detection.
    Cloudflare Managed Ruleset N/ASQLi - ORD and ASCII - HeadersLogBlockThis is a new detection.
    Cloudflare Managed Ruleset N/ASQLi - Destructive OperationsLogBlockThis is a new detection.
  1. Zero Trust Network Session Logs are now generated for all traffic proxied through Cloudflare Gateway, regardless of on-ramp type. This includes traffic from proxy endpoints (PAC files) and Browser Isolation egress — on-ramps that previously did not generate session logs.

    Customers who already consume the zero_trust_network_sessions dataset via Logpush or Log Explorer may see increased log volume if they use these on-ramps.

    For field definitions, refer to Zero Trust Network Session Logs. For traffic analysis, refer to Network session analytics.

  1. Terraform Provider v5.19.0 introduces 14 new resources spanning AI Gateway, Pipelines, R2 Data Catalog, User Groups, Vulnerability Scanner, Workers Observability, and Zero Trust capabilities. This release significantly improves the v4 to v5 migration experience with automatic state upgraders for 26 resources, working seamlessly with the new tf-migrate CLI tool to automate resource renames, attribute updates, and moved block generation. Together, these enhancements reduce manual migration effort and minimize risk when upgrading from v4 to v5.

    Note: cmd/migrate is deprecated in favor of tf-migrate and will be removed in a future release (#7062)

    New Resources

    • cloudflare_ai_gateway: Manage AI Gateway instances
    • cloudflare_certificate_authorities_hostname_associations: Manage mTLS certificate hostname associations
    • cloudflare_custom_page_asset: Manage custom page assets
    • cloudflare_pipeline: Manage Cloudflare Pipelines
    • cloudflare_r2_data_catalog: Manage R2 Data Catalog
    • cloudflare_user_group: Manage user groups
    • cloudflare_user_group_members: Manage user group memberships
    • cloudflare_vulnerability_scanner_credential: Manage vulnerability scanner credentials
    • cloudflare_vulnerability_scanner_credential_set: Manage vulnerability scanner credential sets
    • cloudflare_vulnerability_scanner_target_environment: Manage vulnerability scanner target environments
    • cloudflare_workers_observability_destination: Manage Workers Observability destinations
    • cloudflare_zero_trust_device_ip_profile: Manage Zero Trust device IP profiles
    • cloudflare_zero_trust_device_subnet: Manage Zero Trust device subnets
    • cloudflare_zero_trust_dlp_settings: Manage Zero Trust DLP settings

    Features

    V4 to V5 Migration State Upgraders

    State upgraders added for seamless migration from v4 to v5 for the following resources:

    • account
    • account_member
    • account_token
    • authenticated_origin_pulls
    • authenticated_origin_pulls_hostname_certificate
    • byo_ip_prefix
    • custom_hostname
    • custom_ssl
    • leaked_credential_check
    • leaked_credential_check_rule
    • logpush_ownership_challenge
    • mtls_certificate
    • observatory_scheduled_test
    • pages_domain
    • regional_tiered_cache
    • turnstile_widget
    • workers_custom_domain
    • zero_trust_device_custom_profile
    • zero_trust_device_default_profile
    • zero_trust_device_posture_integration
    • zero_trust_gateway_certificate
    • zero_trust_gateway_settings
    • zero_trust_organization
    • zero_trust_tunnel_cloudflared_virtual_network
    • zone_setting

    Other Features

    • ruleset: Add content_converter and redirects_for_ai_training support to configuration rules
    • zero_trust_gateway_logging: Make importable

    Bug Fixes

    Migration & State Management

    • account_member: Add UseStateForUnknown to status field to prevent drift
    • authenticated_origin_pulls_settings: Fix no prior schema and no-op upgrade
    • certificate_pack: Initialize empty lists instead of null in state upgrader to prevent drift
    • migrations: Handle ambiguous schema_version state for v4/v5 coexistence
    • zero_trust_access_policy: Fix nil pointer panic in state upgrader; set PriorSchema nil for v4 state upgrade

    Resource-Specific Fixes

    • ai_search_instance: Restore original defaults for cache and cache_threshold; conflict resolution
    • apijson: Return empty object from MarshalForPatch when no fields are serializable
    • dlp_predefined_profile: Eliminate perpetual entries and enabled_entries drift
    • dns_record: Avoid unnecessary drift for ipv4_only and ipv6_only attributes; remove private_routing default value
    • drift: Preserve prior state values for optional fields not returned by API
    • healthcheck: Use buildHealthcheckPlanChecks helper for correct plan checks per migration source; update assertions
    • leaked_credential_check_rule: Handle empty ID from v4 provider state migration
    • list_item: Remove context
    • logpush_job: Update model for migration
    • ruleset: Fix migration; add redirects_for_ai_training to SourceV4ActionParametersModel; fix duplicate model attribute
    • worker: Add UseStateForUnknown() plan modifiers and update tests for observability.traces
    • workers_custom_domain: Handle HTTP 200 no content header; update assertions
    • workers_script: Fix model drift
    • zero_trust_access_identity_provider: Fix boolean drifts
    • zero_trust_device_managed_networks: Upgrade resource state
    • zero_trust_gateway_policy: Make filters Computed+Optional to prevent drift
    • zero_trust_gateway_settings: Fix breaking changes; implement sweeper to reset account to clean defaults
    • zone_setting: Migration test improvements and fixes

    Documentation

    • healthcheck: Update port description to clarify defaults
    • Add application-scoped access policy migration guidance
    • Update zone_settings_override migration guide for tf-migrate v2 workflow

    For more information

  1. We're excited to announce tf-migrate, a purpose-built CLI tool that simplifies migrating from Cloudflare Terraform Provider v4 to v5.

    v5 is stable and ready for production

    Terraform Provider v5 is stable and actively receiving updates. We encourage all users to migrate to v5 to take advantage of ongoing enhancements and new capabilities.

    Cloudflare uses tf-migrate to migrate our own infrastructure — the same tool we're providing to the community — ensuring the best possible migration experience.

    What tf-migrate does

    tf-migrate automates the tedious and error-prone parts of the v4 to v5 migration process:

    • Resource type renames – Automatically updates cloudflare_recordcloudflare_dns_record, cloudflare_access_applicationcloudflare_zero_trust_access_application, and 40+ other renamed resources
    • Attribute transformations – Updates field names (e.g., valuecontent for DNS records) and restructures nested blocks
    • Moved block generation – Creates Terraform 1.8+ moved blocks to prevent resource replacements and ensure zero-downtime migrations
    • Cross-file reference updates – Automatically finds and updates all references to renamed resources across your entire configuration
    • Dry-run mode – Preview all changes before applying them to ensure safety

    Combined with the automatic state upgraders introduced in v5.19+, tf-migrate eliminates the manual work and risk that previously made v5 migrations challenging. Tf-migrate operates directly on the config, and the built-in state upgraders handle the rest.

    Supported resources

    Tf-migrate currently supports the most common Terraform resources our customers use. We are actively working to expand coverage, with the most commonly used resources prioritized first.

    For the complete list of supported resources and their migration status, refer to the v5 Stabilization Tracker. This list is updated regularly as additional resources are stabilized and migration support is added.

    Resources not yet supported by tf-migrate will need to be migrated manually using the version 5 upgrade guide. The upgrade guide provides step-by-step instructions for handling resource renames, attribute changes, and state migrations.

    Get started

    We have been releasing Betas over the past month and a half while testing this tool. See the full changelog of those Betas here: tf-migrate releases.

  1. Independent MFA in Cloudflare Access now supports two additional organization-level controls:

    • Restrict authenticators by AAGUID — Limit enrollment to a specific set of WebAuthn authenticators using their AAGUID. This is useful for organizations that require FIPS-validated security keys or company-issued hardware. AAGUIDs are managed through a new List type.
    • AMR matching — Skip the independent MFA prompt when the identity provider has already performed an equivalent MFA. Access reads the amr claim defined in RFC 8176 and matches supported values such as hwk, otp, and fpt to the authenticator types allowed on the application or policy. This prevents users from having to complete MFA twice when their identity provider already enforces it.

    To get started, refer to Independent MFA.

  1. Audit Logs v2 now supports organization-level audit logs. Org Admins can retrieve audit events for actions performed at the organization level via the Audit Logs v2 API.

    To retrieve organization-level audit logs, use the following endpoint:

    Terminal window
    GET https://api.cloudflare.com/client/v4/organizations/{organization_id}/logs/audit

    This release covers user-initiated actions performed through organization-level APIs. Audit logs for system-initiated actions, a dashboard UI, and Logpush support for organizations will be added in future releases.

    For more information, refer to the Audit Logs documentation.