Skip to content

Changelog

New updates and improvements at Cloudflare.

WAF
hero image
  1. This emergency release introduces rules for CVE-2025-55183 and CVE-2025-55184, targeting server-side function exposure and resource-exhaustion patterns, respectively.

    Key Findings

    Added coverage for Leaking Server Functions (CVE-2025-55183) and React Function DoS detection (CVE-2025-55184).

    Impact

    These updates strengthen protection for server-function abuse techniques (CVE-2025-55183, CVE-2025-55184) that may expose internal logic or disrupt application availability.

    RulesetRule IDLegacy Rule IDDescriptionPrevious ActionNew ActionComments
    Cloudflare Managed Ruleset N/AReact - Leaking Server Functions - CVE:CVE-2025-55183N/ABlockThis was labeled as Generic - Server Function Source Code Exposure.
    Cloudflare Free Ruleset N/AReact - Leaking Server Functions - CVE:CVE-2025-55183N/ABlockThis was labeled as Generic - Server Function Source Code Exposure.
    Cloudflare Managed Ruleset N/AReact - DoS - CVE:CVE-2025-55184N/ADisabledThis was labeled as Generic – Server Function Resource Exhaustion.
  1. This additional week's emergency release introduces improvements to our existing rule for React – Remote Code Execution – CVE-2025-55182 - 2, along with two new generic detections covering server-side function exposure and resource-exhaustion patterns.

    Key Findings

    Enhanced detection logic for React – RCE – CVE-2025-55182, added Generic – Server Function Source Code Exposure, and added Generic – Server Function Resource Exhaustion.

    Impact

    These updates strengthen protection against React RCE exploitation attempts and broaden coverage for common server-function abuse techniques that may expose internal logic or disrupt application availability.

    RulesetRule IDLegacy Rule IDDescriptionPrevious ActionNew ActionComments
    Cloudflare Managed Ruleset N/AReact - Remote Code Execution - CVE:CVE-2025-55182 - 2N/ABlockThis is an improved detection.
    Cloudflare Free Ruleset N/AReact - Remote Code Execution - CVE:CVE-2025-55182 - 2N/ABlockThis is an improved detection.
    Cloudflare Managed Ruleset N/AGeneric - Server Function Source Code ExposureN/ABlockThis is a new detection.
    Cloudflare Free Ruleset N/AGeneric - Server Function Source Code ExposureN/ABlockThis is a new detection.
    Cloudflare Managed Ruleset N/AGeneric - Server Function Resource ExhaustionN/ADisabledThis is a new detection.
  1. Cloudflare WAF now inspects request-payload size of up to 1 MB across all plans to enhance our detection capabilities for React RCE (CVE-2025-55182).

    Key Findings

    React payloads commonly have a default maximum size of 1 MB. Cloudflare WAF previously inspected up to 128 KB on Enterprise plans, with even lower limits on other plans.

    Update: We later reinstated the maximum request-payload size the Cloudflare WAF inspects. Refer to Updating the WAF maximum payload values for details.

  1. We are reinstating the maximum request-payload size the Cloudflare WAF inspects, with WAF on Enterprise zones inspecting up to 128 KB.

    Key Findings

    On December 5, 2025, we initially attempted to increase the maximum WAF payload limit to 1 MB across all plans. However, an automatic rollout for all customers proved impractical because the increase led to a surge in false positives for existing managed rules.

    This issue was particularly notable within the Cloudflare Managed Ruleset and the Cloudflare OWASP Core Ruleset, impacting customer traffic.

    Impact

    Customers on paid plans can increase the limit to 1 MB for any of their zones by contacting Cloudflare Support. Free zones are already protected up to 1 MB and do not require any action.

  1. The WAF rule deployed yesterday to block unsafe deserialization-based RCE has been updated. The rule description now reads “React – RCE – CVE-2025-55182”, explicitly mapping to the recently disclosed React Server Components vulnerability. Detection logic remains unchanged.

    Key Findings

    Rule description updated to reference React – RCE – CVE-2025-55182 while retaining existing unsafe-deserialization detection.

    Impact

    Improved classification and traceability with no change to coverage against remote code execution attempts.

    RulesetRule IDLegacy Rule IDDescriptionPrevious ActionNew ActionComments
    Cloudflare Managed Ruleset N/AReact - RCE - CVE:CVE-2025-55182N/ABlockRule metadata description changed. Detection unchanged.
    Cloudflare Free Ruleset N/AReact - RCE - CVE:CVE-2025-55182N/ABlockRule metadata description changed. Detection unchanged.
  1. This week's emergency release introduces a new rule to block a critical RCE vulnerability in widely-used web frameworks through unsafe deserialization patterns.

    Key Findings

    New WAF rule deployed for RCE Generic Framework to block malicious POST requests containing unsafe deserialization patterns. If successfully exploited, this vulnerability allows attackers with network access via HTTP to execute arbitrary code remotely.

    Impact

    • Successful exploitation allows unauthenticated attackers to execute arbitrary code remotely through crafted serialization payloads, enabling complete system compromise, data exfiltration, and potential lateral movement within affected environments.
    RulesetRule IDLegacy Rule IDDescriptionPrevious ActionNew ActionComments
    Cloudflare Managed Ruleset N/ARCE Generic - FrameworkN/ABlockThis is a new detection.
    Cloudflare Free Ruleset N/ARCE Generic - FrameworkN/ABlockThis is a new detection.
  1. This week’s release introduces new detections for remote code execution attempts targeting Monsta FTP (CVE-2025-34299), alongside improvements to an existing XSS detection to enhance coverage.

    Key Findings

    • CVE-2025-34299 is a critical remote code execution flaw in Monsta FTP, arising from improper handling of user-supplied parameters within the file-handling interface. Certain builds allow crafted requests to bypass sanitization and reach backend PHP functions that execute arbitrary commands. Attackers can send manipulated parameters through the web panel to trigger command execution within the application’s runtime environment.

    Impact

    If exploited, the vulnerability enables full remote command execution on the underlying server, allowing takeover of the hosting environment, unauthorized file access, and potential lateral movement. As the flaw can be triggered without authentication on exposed Monsta FTP instances, it represents a severe risk for publicly reachable deployments.

    RulesetRule IDLegacy Rule IDDescriptionPrevious ActionNew ActionComments
    Cloudflare Managed Ruleset N/AMonsta FTP - Remote Code Execution - CVE:CVE-2025-34299LogBlockThis is a new detection
    Cloudflare Managed Ruleset N/AXSS - JS Context Escape - BetaLogBlockThis rule is merged into the original rule "XSS - JS Context Escape" (ID: )
  1. This week highlights enhancements to detection signatures improving coverage for vulnerabilities in FortiWeb, linked to CVE-2025-64446, alongside new detection logic expanding protection against PHP Wrapper Injection techniques.

    Key Findings

    This vulnerability enables an unauthenticated attacker to bypass access controls by abusing the CGIINFO header. The latest update strengthens detection logic to ensure a reliable identification of crafted requests attempting to exploit this flaw.

    Impact

    • FortiWeb (CVE-2025-64446): Exploitation allows a remote unauthenticated adversary to circumvent authentication mechanisms by sending a manipulated CGIINFO header to FortiWeb’s backend CGI handler. Successful exploitation grants unintended access to restricted administrative functionality, potentially enabling configuration tampering or system-level actions.
    RulesetRule IDLegacy Rule IDDescriptionPrevious ActionNew ActionComments
    Cloudflare Managed Ruleset N/AFortiWeb - Authentication Bypass via CGIINFO Header - CVE:CVE-2025-64446LogBlockThis is a new detection
    Cloudflare Managed Ruleset N/APHP Wrapper Injection - Body - BetaLogDisabledThis rule has been merged into the original rule "PHP Wrapper Injection - Body" (ID: )
    Cloudflare Managed Ruleset N/APHP Wrapper Injection - URI - BetaLogDisabledThis rule has been merged into the original rule "PHP Wrapper Injection - URI" (ID: )
  1. This week’s release introduces a critical detection for CVE-2025-61757, a vulnerability in the Oracle Identity Manager REST WebServices component.

    Key Findings

    This flaw allows unauthenticated attackers with network access over HTTP to fully compromise the Identity Manager, potentially leading to a complete takeover.

    Impact

    Oracle Identity Manager (CVE-2025-61757): Exploitation could allow an unauthenticated remote attacker to bypass security checks by sending specially crafted requests to the application's message processor. This enables the creation of arbitrary employee accounts, which can be leveraged to modify system configurations and achieve full system compromise.

    RulesetRule IDLegacy Rule IDDescriptionPrevious ActionNew ActionComments
    Cloudflare Managed Ruleset N/AOracle Identity Manager - Pre-Auth RCE - CVE:CVE-2025-61757N/ABlockThis is a new detection.
  1. This week highlights enhancements to detection signatures improving coverage for vulnerabilities in DELMIA Apriso, linked to CVE-2025-6205.

    Key Findings

    This vulnerability allows unauthenticated attackers to gain privileged access to the application. The latest update provides enhanced detection logic for resilient protection against exploitation attempts.

    Impact

    • DELMIA Apriso (CVE-2025-6205): Exploitation could allow an unauthenticated remote attacker to bypass security checks by sending specially crafted requests to the application's message processor. This enables the creation of arbitrary employee accounts, which can be leveraged to modify system configurations and achieve full system compromise.
    RulesetRule IDLegacy Rule IDDescriptionPrevious ActionNew ActionComments
    Cloudflare Managed Ruleset N/ADELMIA Apriso - Auth Bypass - CVE:CVE-2025-6205LogBlockThis is a new detection.
    Cloudflare Managed Ruleset N/APHP Wrapper Injection - BodyN/ADisabledRule metadata description refined. Detection unchanged.
    Cloudflare Managed Ruleset N/APHP Wrapper Injection - URIN/ADisabledRule metadata description refined. Detection unchanged.
  1. This week’s release introduces new detections for Prototype Pollution across three common vectors: URI, Body, and Header/Form.

    Key Findings

    • These attacks can affect both API and web applications by altering normal behavior or bypassing security controls.

    Impact

    Exploitation may allow attackers to change internal logic or cause unexpected behavior in applications using JavaScript or Node.js frameworks. Developers should sanitize input keys and avoid merging untrusted data structures.

    RulesetRule IDLegacy Rule IDDescriptionPrevious ActionNew ActionComments
    Cloudflare Managed Ruleset N/AGeneric Rules - Prototype Pollution - URILogDisabledThis is a new detection
    Cloudflare Managed Ruleset N/AGeneric Rules - Prototype Pollution - BodyLogDisabledThis is a new detection
    Cloudflare Managed Ruleset N/AGeneric Rules - Prototype Pollution - Header - FormLogDisabledThis is a new detection
  1. This week’s emergency release introduces a new detection signature that enhances coverage for a critical vulnerability in the React Native Metro Development Server, tracked as CVE-2025-11953.

    Key Findings

    The Metro Development Server exposes an HTTP endpoint that is vulnerable to OS command injection (CWE-78). An unauthenticated network attacker can send a crafted request to this endpoint and execute arbitrary commands on the host running Metro. The vulnerability affects Metro/cli-server-api builds used by React Native Community CLI in pre-patch development releases.

    Impact

    Successful exploitation of CVE-2025-11953 may result in remote command execution on developer workstations or CI/build agents, leading to credential and secret exposure, source tampering, and potential lateral movement into internal networks. Administrators and developers are strongly advised to apply the vendor's patches and restrict Metro’s network exposure to reduce this risk.

    RulesetRule IDLegacy Rule IDDescriptionPrevious ActionNew ActionComments
    Cloudflare Managed Ruleset N/AReact Native Metro - Command Injection - CVE:CVE-2025-11953N/ABlockThis is a New Detection
  1. This week highlights enhancements to detection signatures improving coverage for vulnerabilities in Adobe Commerce and Magento Open Source, linked to CVE-2025-54236.

    Key Findings

    This vulnerability allows unauthenticated attackers to take over customer accounts through the Commerce REST API and, in certain configurations, may lead to remote code execution. The latest update provides enhanced detection logic for resilient protection against exploitation attempts.

    Impact

    • Adobe Commerce (CVE-2025-54236): Exploitation may allow attackers to hijack sessions, execute arbitrary commands, steal data, and disrupt storefronts, resulting in confidentiality and integrity risks for merchants. Administrators are strongly encouraged to apply vendor patches without delay.
    RulesetRule IDLegacy Rule IDDescriptionPrevious ActionNew ActionComments
    Cloudflare Managed Ruleset 100774CAdobe Commerce - Remote Code Execution - CVE:CVE-2025-54236LogBlockThis is an improved detection.
  1. This week’s release introduces a new detection signature that enhances coverage for a critical vulnerability in Oracle E-Business Suite, tracked as CVE-2025-61884.

    Key Findings

    The flaw is easily exploitable and allows an unauthenticated attacker with network access to compromise Oracle Configurator, which can grant access to sensitive resources and configuration data. The affected versions include 12.2.3 through 12.2.14.

    Impact

    Successful exploitation of CVE-2025-61884 may result in unauthorized access to critical business data or full exposure of information accessible through Oracle Configurator. Administrators are strongly advised to apply vendor's patches and recommended mitigations to reduce this exposure.

    RulesetRule IDLegacy Rule IDDescriptionPrevious ActionNew ActionComments
    Cloudflare Managed Ruleset N/AOracle E-Business Suite - SSRF - CVE:CVE-2025-61884N/ABlockThis is a New Detection
  1. This week’s release introduces a new detection signature that enhances coverage for a critical vulnerability in Windows Server Update Services (WSUS), tracked as CVE-2025-59287.

    Key Findings

    The vulnerability allows unauthenticated attackers to potentially achieve remote code execution. The updated detection logic strengthens defenses by improving resilience against exploitation attempts targeting this flaw.

    Impact

    Successful exploitation of CVE-2025-59287 could enable attackers to hijack sessions, execute arbitrary commands, exfiltrate sensitive data, and disrupt storefront operations. These actions pose significant confidentiality and integrity risks to affected environments. Administrators should apply vendor patches immediately to mitigate exposure.

    RulesetRule IDLegacy Rule IDDescriptionPrevious ActionNew ActionComments
    Cloudflare Managed Ruleset N/AWindows Server - Deserialization - CVE:CVE-2025-59287N/ABlockThis is a New Detection
  1. This week highlights enhancements to detection signatures improving coverage for vulnerabilities in Adobe Commerce and Magento Open Source, linked to CVE-2025-54236.

    Key Findings

    This vulnerability allows unauthenticated attackers to take over customer accounts through the Commerce REST API and, in certain configurations, may lead to remote code execution. The latest update enhances detection logic to provide more resilient protection against exploitation attempts.

    Impact

    Adobe Commerce (CVE-2025-54236): Exploitation may allow attackers to hijack sessions, execute arbitrary commands, steal data, and disrupt storefronts, resulting in confidentiality and integrity risks for merchants. Administrators are strongly encouraged to apply vendor patches without delay.

    RulesetRule IDLegacy Rule IDDescriptionPrevious ActionNew ActionComments
    Cloudflare Managed Ruleset N/AAdobe Commerce - Remote Code Execution - CVE:CVE-2025-54236N/ABlockThis is a New Detection
  1. This week’s update introduces an enhanced rule that expands detection coverage for a critical vulnerability in Oracle E-Business Suite. It also improves an existing rule to provide more reliable coverage in request processing.

    Key Findings

    New WAF rule deployed for Oracle E-Business Suite (CVE-2025-61882) to block unauthenticated attacker's network access via HTTP to compromise Oracle Concurrent Processing. If successfully exploited, this vulnerability may result in remote code execution.

    Impact

    • Successful exploitation of CVE-2025-61882 allows unauthenticated attackers to execute arbitrary code remotely by chaining multiple weaknesses, enabling lateral movement into internal services, data exfiltration, and large-scale extortionware deployment within Oracle E-Business Suite environments.
    RulesetRule IDLegacy Rule IDDescriptionPrevious ActionNew ActionComments
    Cloudflare Managed Ruleset 100598ARemote Code Execution - Common Bash Bypass - BetaLogBlockThis rule is merged into the original rule "Remote Code Execution - Common Bash Bypass" (ID: )
    Cloudflare Managed Ruleset 100916AOracle E-Business Suite - Remote Code Execution - CVE:CVE-2025-61882 - 2LogBlockThis is a New Detection
    Cloudflare Managed Ruleset N/AHTTP TruncatedN/ADisabledThis is a New Detection
  1. This week we introduced several new detections across Cloudflare Managed Rulesets, expanding coverage for high-impact vulnerability classes such as SSRF, SQLi, SSTI, Reverse Shell attempts, and Prototype Pollution. These rules aim to improve protection against attacker-controlled payloads that exploit misconfigurations or unvalidated input in web applications.

    Key Findings

    New detections added for multiple exploit categories:

    SSRF (Server-Side Request Forgery) — new rules targeting both local and cloud metadata abuse patterns (Beta).

    SQL Injection (SQLi) — rules for common patterns, sleep/time-based injections, and string/wait function exploitation across headers and URIs.

    SSTI (Server-Side Template Injection) — arithmetic-based probe detections introduced across URI, header, and body fields.

    Reverse Shell and XXE payloads — enhanced heuristics for command execution and XML external entity misuse.

    Prototype Pollution — new Beta rule identifying common JSON payload structures used in object prototype poisoning.

    PHP Wrapper Injection and HTTP Parameter Pollution detections — to catch path traversal and multi-parameter manipulation attempts.

    Anomaly Header Checks — detecting CRLF injection attempts in header names.

    Impact

    These updates help detect multi-vector payloads that blend SSRF + RCE or SQLi + SSTI attacks, especially in cloud-hosted applications with exposed metadata endpoints or unsafe template rendering.

    Prototype Pollution and HTTP parameter pollution rules address emerging JavaScript supply-chain exploitation patterns increasingly seen in real-world incidents.

    RulesetRule IDLegacy Rule IDDescriptionPrevious ActionNew ActionComments
    Cloudflare Managed Ruleset N/AAnomaly:Header - name - CR, LFN/ADisabledThis is a New Detection
    Cloudflare Managed Ruleset N/AGeneric Rules - Reverse Shell - BodyN/ADisabledThis is a New Detection
    Cloudflare Managed Ruleset N/AGeneric Rules - Reverse Shell - HeaderN/ADisabledThis is a New Detection
    Cloudflare Managed Ruleset N/AGeneric Rules - Reverse Shell - URIN/ADisabledThis is a New Detection
    Cloudflare Managed Ruleset N/AGeneric Rules - XXE - BodyN/ADisabledThis is a New Detection
    Cloudflare Managed Ruleset N/AGeneric Rules - SQLi - Common Patterns - Header URIN/ADisabledThis is a New Detection
    Cloudflare Managed Ruleset N/AGeneric Rules - SQLi - Sleep Function - Header URIN/ADisabledThis is a New Detection
    Cloudflare Managed Ruleset N/AGeneric Rules - SQLi - String Function - Header URIN/ADisabledThis is a New Detection
    Cloudflare Managed Ruleset N/AGeneric Rules - SQLi - WaitFor Function - Header URIN/ADisabledThis is a New Detection
    Cloudflare Managed Ruleset N/ASSRF - Local - BetaN/ADisabledThis is a New Detection
    Cloudflare Managed Ruleset N/ASSRF - Local - 2 - BetaN/ADisabledThis is a New Detection
    Cloudflare Managed Ruleset N/ASSRF - Cloud - BetaN/ADisabledThis is a New Detection
    Cloudflare Managed Ruleset N/ASSRF - Cloud - 2 - BetaN/ADisabledThis is a New Detection
    Cloudflare Managed Ruleset N/ASSTI - Arithmetic Probe - URIN/ADisabledThis is a New Detection
    Cloudflare Managed Ruleset N/ASSTI - Arithmetic Probe - HeaderN/ADisabledThis is a New Detection
    Cloudflare Managed Ruleset N/ASSTI - Arithmetic Probe - BodyN/ADisabledThis is a New Detection
    Cloudflare Managed Ruleset N/APHP Wrapper InjectionN/ADisabledThis is a New Detection
    Cloudflare Managed Ruleset N/APHP Wrapper InjectionN/ADisabledThis is a New Detection
    Cloudflare Managed Ruleset N/AHTTP parameter pollutionN/ADisabledThis is a New Detection
    Cloudflare Managed Ruleset N/APrototype Pollution - Common Payloads - BetaN/ADisabledThis is a New Detection
  1. This week’s highlights include a new JinJava rule targeting a sandbox-bypass flaw that could allow malicious template input to escape execution controls. The rule improves detection for unsafe template rendering paths.

    Key Findings

    New WAF rule deployed for JinJava (CVE-2025-59340) to block a sandbox bypass in the template engine that permits attacker-controlled type construction and arbitrary class instantiation; in vulnerable environments this can escalate to remote code execution and full server compromise.

    Impact

    • CVE-2025-59340 — Exploitation enables attacker-supplied type descriptors / Jackson ObjectMapper abuse, allowing arbitrary class loading, file/URL access (LFI/SSRF primitives) and, with suitable gadget chains, potential remote code execution and system compromise.
    RulesetRule IDLegacy Rule IDDescriptionPrevious ActionNew ActionComments
    Cloudflare Managed Ruleset 100892JinJava - SSTI - CVE:CVE-2025-59340LogBlockThis is a New Detection
  1. This week highlights multiple critical Cisco vulnerabilities (CVE-2025-20363, CVE-2025-20333, CVE-2025-20362). This flaw stems from improper input validation in HTTP(S) requests. An authenticated VPN user could send crafted requests to execute code as root, potentially compromising the device. The initial two rules were made available on September 28, with a third rule added today, October 7, for more robust protection.

    • Cisco (CVE-2025-20333, CVE-2025-20362, CVE-2025-20363): Multiple vulnerabilities that could allow attackers to exploit unsafe deserialization and input validation flaws. Successful exploitation may result in arbitrary code execution, privilege escalation, or command injection on affected systems.

    Impact

    Cisco (CVE-2025-20333, CVE-2025-20362, CVE-2025-20363): Exploitation enables attackers to escalate privileges or achieve remote code execution via command injection. Administrators are strongly advised to apply vendor updates immediately.

    RulesetRule IDLegacy Rule IDDescriptionPrevious ActionNew ActionComments
    Cloudflare Managed Ruleset 100788BCisco Secure Firewall Adaptive Security Appliance - Remote Code Execution - CVE:CVE-2025-20333, CVE:CVE-2025-20362, CVE:CVE-2025-20363N/ABlockThis is a New Detection
  1. This week’s highlights prioritise an emergency Oracle E-Business Suite RCE rule deployed to block active, high-impact exploitation. Also addressed are high-severity Chaos Mesh controller command-injection flaws that enable unauthenticated in-cluster RCE and potential cluster compromise, plus a form-data multipart boundary issue that permits HTTP Parameter Pollution (HPP). Two new generic SQLi detections were added to catch inline-comment obfuscation and information disclosure techniques.

    Key Findings

    • New emergency rule released for Oracle E-Business Suite (CVE-2025-61882) addressing an actively exploited remote code execution vulnerability in core business application modules. Immediate mitigation deployed to protect enterprise workloads.

    • Chaos Mesh (CVE-2025-59358,CVE-2025-59359,CVE-2025-59360,CVE-2025-59361): A GraphQL debug endpoint on the Chaos Controller Manager is exposed without authentication; several controller mutations (cleanTcs, killProcesses, cleanIptables) are vulnerable to OS command injection.

    • Form-Data (CVE-2025-7783): Attackers who can observe Math.random() outputs and control request fields in form-data may exploit this flaw to perform HTTP parameter pollution, leading to request tampering or data manipulation.

    • Two new generic SQLi detections added to enhance baseline coverage against inline-comment obfuscation and information disclosure attempts.

    Impact

    • CVE-2025-61882 — Oracle E-Business Suite remote code execution (emergency detection): attacker-controlled input can yield full system compromise, data exfiltration, and operational outage; immediate blocking enforced.

    • CVE-2025-59358 / CVE-2025-59359 / CVE-2025-59360 / CVE-2025-59361 — Unauthenticated command-injection in Chaos Mesh controllers allowing remote code execution, cluster compromise, and service disruption (high availability risk).

    • CVE-2025-7783 — Predictable multipart boundaries in form-data enabling HTTP Parameter Pollution; results include request tampering, parameter overwrite, and downstream data integrity loss.

    RulesetRule IDLegacy Rule IDDescriptionPrevious ActionNew ActionComments
    Cloudflare Managed Ruleset 100882Chaos Mesh - Missing Authentication - CVE:CVE-2025-59358LogDisabledThis is a New Detection
    Cloudflare Managed Ruleset 100883Chaos Mesh - Command Injection - CVE:CVE-2025-59359LogBlockThis is a New Detection
    Cloudflare Managed Ruleset 100884Chaos Mesh - Command Injection - CVE:CVE-2025-59361LogBlockThis is a New Detection
    Cloudflare Managed Ruleset 100886Form-Data - Parameter Pollution - CVE:CVE-2025-7783LogBlockThis is a New Detection
    Cloudflare Managed Ruleset 100888Chaos Mesh - Command Injection - CVE:CVE-2025-59360LogBlockThis is a New Detection
    Cloudflare Managed Ruleset 100916Oracle E-Business Suite - Remote Code Execution - CVE:CVE-2025-61882N/ABlockThis is a New Detection
    Cloudflare Managed Ruleset 100917Generic Rules - SQLi - Inline Comment InjectionN/ADisabledThis is a New Detection
    Cloudflare Managed Ruleset 100918Generic Rules - SQLi - Information DisclosureN/ADisabledThis is a New Detection
  1. Managed Ruleset Updated

    This update introduces 21 new detections in the Cloudflare Managed Ruleset (all currently set to Disabled mode to preserve remediation logic and allow quick activation if needed). The rules cover a broad spectrum of threats - SQL injection techniques, command and code injection, information disclosure of common files, URL anomalies, and cross-site scripting.

    RulesetRule IDLegacy Rule IDDescriptionPrevious ActionNew ActionComments
    Cloudflare Managed Ruleset 100902Generic Rules - Command Execution - 2N/ADisabledThis is a New Detection
    Cloudflare Managed Ruleset 100908Generic Rules - Command Execution - 3N/ADisabledThis is a New Detection
    Cloudflare Managed Ruleset 100910Generic Rules - Command Execution - 4N/ADisabledThis is a New Detection
    Cloudflare Managed Ruleset 100915Generic Rules - Command Execution - 5N/ADisabledThis is a New Detection
    Cloudflare Managed Ruleset 100899Generic Rules - Content-Type AbuseN/ADisabledThis is a New Detection
    Cloudflare Managed Ruleset 100914Generic Rules - Content-Type InjectionN/ADisabledThis is a New Detection
    Cloudflare Managed Ruleset 100911Generic Rules - Cookie Header InjectionN/ADisabledThis is a New Detection
    Cloudflare Managed Ruleset 100905Generic Rules - NoSQL InjectionN/ADisabledThis is a New Detection
    Cloudflare Managed Ruleset 100913Generic Rules - NoSQL Injection - 2N/ADisabledThis is a New Detection
    Cloudflare Managed Ruleset 100907Generic Rules - Parameter PollutionN/ADisabledThis is a New Detection
    Cloudflare Managed Ruleset 100906Generic Rules - PHP Object InjectionN/ADisabledThis is a New Detection
    Cloudflare Managed Ruleset 100904Generic Rules - Prototype PollutionN/ADisabledThis is a New Detection
    Cloudflare Managed Ruleset 100897Generic Rules - Prototype Pollution 2N/ADisabledThis is a New Detection
    Cloudflare Managed Ruleset 100903Generic Rules - Reverse ShellN/ADisabledThis is a New Detection
    Cloudflare Managed Ruleset 100909Generic Rules - Reverse Shell - 2N/ADisabledThis is a New Detection
    Cloudflare Managed Ruleset 100898Generic Rules - SSJI NoSQLN/ADisabledThis is a New Detection
    Cloudflare Managed Ruleset 100896Generic Rules - SSRFN/ADisabledThis is a New Detection
    Cloudflare Managed Ruleset 100895Generic Rules - Template InjectionN/ADisabledThis is a New Detection
    Cloudflare Managed Ruleset 100895AGeneric Rules - Template Injection - 2N/ADisabledThis is a New Detection
    Cloudflare Managed Ruleset 100912Generic Rules - XXEN/ADisabledThis is a New Detection
    Cloudflare Managed Ruleset 100900Relative Paths - Anomaly HeadersN/ADisabledThis is a New Detection
  1. This week highlights four important vendor- and component-specific issues: an authentication bypass in SimpleHelp (CVE-2024-57727), an information-disclosure flaw in Flowise Cloud (CVE-2025-58434), an SSRF in the WordPress plugin Ditty (CVE-2025-8085), and a directory-traversal bug in Vite (CVE-2025-30208). These are paired with improvements to our generic detection coverage (SQLi, SSRF) to raise the baseline and reduce noisy gaps.

    Key Findings

    • SimpleHelp (CVE-2024-57727): Authentication bypass in SimpleHelp that can allow unauthorized access to management interfaces or sessions.

    • Flowise Cloud (CVE-2025-58434): Information-disclosure vulnerability in Flowise Cloud that may expose sensitive configuration or user data to unauthenticated or low-privileged actors.

    • WordPress:Plugin: Ditty (CVE-2025-8085): SSRF in the Ditty WordPress plugin enabling server-side requests that could reach internal services or cloud metadata endpoints.

    • Vite (CVE-2025-30208): Directory-traversal vulnerability in Vite allowing access to filesystem paths outside the intended web root.

    Impact

    These vulnerabilities allow attackers to gain access, escalate privileges, or execute actions that were previously unavailable:

    • SimpleHelp (CVE-2024-57727): An authentication bypass that can let unauthenticated attackers access management interfaces or hijack sessions — enabling lateral movement, credential theft, or privilege escalation within affected environments.

    • Flowise Cloud (CVE-2025-58434): Information-disclosure flaw that can expose sensitive configuration, tokens, or user data; leaked secrets may be chained into account takeover or privileged access to backend services.

    • WordPress:Plugin: Ditty (CVE-2025-8085): SSRF that enables server-side requests to internal services or cloud metadata endpoints, potentially allowing attackers to retrieve credentials or reach otherwise inaccessible infrastructure, leading to privilege escalation or cloud resource compromise.

    • Vite (CVE-2025-30208): Directory-traversal vulnerability that can expose filesystem contents outside the web root (configuration files, keys, source code), which attackers can use to escalate privileges or further compromise systems.

    RulesetRule IDLegacy Rule IDDescriptionPrevious ActionNew ActionComments
    Cloudflare Managed Ruleset 100717SimpleHelp - Auth Bypass - CVE:CVE-2024-57727LogBlockThis rule is merged to 100717 in legacy WAF and in new WAF
    Cloudflare Managed Ruleset 100775Flowise Cloud - Information Disclosure - CVE:CVE-2025-58434LogBlockThis is a New Detection
    Cloudflare Managed Ruleset 100881WordPress:Plugin:Ditty - SSRF - CVE:CVE-2025-8085LogBlockThis is a New Detection
    Cloudflare Managed Ruleset 100887Vite - Directory Traversal - CVE:CVE-2025-30208LogBlockThis is a New Detection
  1. This week highlights multiple critical Cisco vulnerabilities (CVE-2025-20363, CVE-2025-20333, CVE-2025-20362). This flaw stems from improper input validation in HTTP(S) requests. An authenticated VPN user could send crafted requests to execute code as root, potentially compromising the device.

    Key Findings

    • Cisco (CVE-2025-20333, CVE-2025-20362, CVE-2025-20363): Multiple vulnerabilities that could allow attackers to exploit unsafe deserialization and input validation flaws. Successful exploitation may result in arbitrary code execution, privilege escalation, or command injection on affected systems.

    Impact

    Cisco (CVE-2025-20333, CVE-2025-20362, CVE-2025-20363): Exploitation enables attackers to escalate privileges or achieve remote code execution via command injection.

    RulesetRule IDLegacy Rule IDDescriptionPrevious ActionNew ActionComments
    Cloudflare Managed Ruleset 100788Cisco Secure Firewall Adaptive Security Appliance - Remote Code Execution - CVE:CVE-2025-20333, CVE:CVE-2025-20362, CVE:CVE-2025-20363N/ADisabledThis is a New Detection
    Cloudflare Managed Ruleset 100788ACisco Secure Firewall Adaptive Security Appliance - Remote Code Execution - CVE:CVE-2025-20333, CVE:CVE-2025-20362, CVE:CVE-2025-20363N/ADisabledThis is a New Detection
  1. Managed Ruleset Updated

    This update introduces 11 new detections in the Cloudflare Managed Ruleset (all currently set to Disabled mode to preserve remediation logic and allow quick activation if needed). The rules cover a broad spectrum of threats - SQL injection techniques, command and code injection, information disclosure of common files, URL anomalies, and cross-site scripting.

    RulesetRule IDLegacy Rule IDDescriptionPrevious ActionNew ActionComments
    Cloudflare Managed Ruleset 100859ASQLi - UNION - 3N/ADisabledThis is a New Detection
    Cloudflare Managed Ruleset 100889Command Injection - Generic 9N/ADisabledThis is a New Detection
    Cloudflare Managed Ruleset 100890Information Disclosure - Common Files - 2N/ADisabledThis is a New Detection
    Cloudflare Managed Ruleset 100891Anomaly:URL - Relative PathsN/ADisabledThis is a New Detection
    Cloudflare Managed Ruleset 100894XSS - Inline FunctionN/ADisabledThis is a New Detection
    Cloudflare Managed Ruleset 100895XSS - DOMN/ADisabledThis is a New Detection
    Cloudflare Managed Ruleset 100896SQLi - MSSQL Length EnumerationN/ADisabledThis is a New Detection
    Cloudflare Managed Ruleset 100897Generic Rules - Code Injection - 3N/ADisabledThis is a New Detection
    Cloudflare Managed Ruleset 100898SQLi - EvasionN/ADisabledThis is a New Detection
    Cloudflare Managed Ruleset 100899SQLi - Probing 2N/ADisabledThis is a New Detection
    Cloudflare Managed Ruleset 100900SQLi - ProbingN/ADisabledThis is a New Detection