Cloudflare Docs
Support
Support
Edit this page on GitHub
Set theme to dark (⇧+D)

WordPress Jetpack and Cloudflare

​​ Overview

Cloudflare and Jetpack for WordPress should require no additional configuration to operate together. However we do have some security features designed to protect your Jetpack installation, read on below to learn more.

​​ Default Jetpack protection from Cloudflare

The Cloudflare WAF managed rule WP0007 protects the xmlrpc.php file on all Cloudflare plans to allow only Jetpack to use the xmlrpc.php?for=jetpack query string. Cloudflare does this by only allowing the IP range of Jetpack’s automation systems. As such, any attempt to access xmlrpc.php?for=jetpack from an IP that is not a genuine Jetpack IP address will be blocked with a HTTP 403 Forbidden message from Cloudflare. This in itself is nothing to worry about and improves the security of your website and does not affect the functionality of Jetpack whatsoever.

For more information about why this was originally implemented, take a look at our blog post on the subject:

https://blog.cloudflare.com/our-waf-is-keeping-wordpress-jetpack-on-track/

​​ Additional WAF managed rules that can impact Jetpack

There is a specific rule in Web Application Firewall (WAF) managed rules that if enabled will block Jetpack’s servers from administering your settings. The WAF managed rule “WP0002 - Block WordPress XML-RPC” rule is disabled by default, but when enabled it completely disables access to the xmlrpc.php file. As such, we only recommend enabling this rule as an emergency measure if your xmlrpc.php endpoint is being attacked.

For further guidance, please contact our Support team.