Skip to content

Commit 0a3b4d8

Browse files
authored
1 parent 82fcd1b commit 0a3b4d8

File tree

2 files changed

+14
-3
lines changed

2 files changed

+14
-3
lines changed

astro.config.ts

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -69,6 +69,14 @@ export default defineConfig({
6969
rehypeTitleFigure,
7070
],
7171
},
72+
image: {
73+
service: {
74+
entrypoint: "astro/assets/services/sharp",
75+
config: {
76+
limitInputPixels: false,
77+
},
78+
},
79+
},
7280
experimental: {
7381
contentIntellisense: true,
7482
},

src/content/changelog/workers/2025-03-22-next-js-vulnerability-waf.mdx

Lines changed: 6 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -10,12 +10,13 @@ date: 2025-03-22T13:00:00Z
1010
---
1111

1212
import { Image } from 'astro:assets';
13+
import managedRuleNextJsAuth from "~/assets/images/changelog/workers/high-res-CVE-2025-29927.gif"
1314

1415
**Update**: We have changed this WAF rule to opt-in only, as sites that use auth middleware with third-party auth vendors were observing failing requests.
1516

1617
**We strongly recommend updating your version of Next.js (if eligible)** to the patched versions, as your app will otherwise be vulnerable to an authentication bypass attack regardless of auth provider.
1718

18-
## Enable the Managed Rule (strongly recommended)
19+
### Enable the Managed Rule (strongly recommended)
1920

2021
This rule is opt-in only for sites on the Pro plan or above in the [WAF managed ruleset](/waf/managed-rules/).
2122

@@ -29,9 +30,11 @@ To enable the rule:
2930
6. Click **Next**
3031
7. Scroll down and choose **Save**
3132

33+
<Image src={managedRuleNextJsAuth} alt="Enable the CVE-2025-29927 rule" width="1280" height="1039" />
34+
3235
This will enable the WAF rule and block requests with the `x-middleware-subrequest` header regardless of Next.js version.
3336

34-
## Create a WAF rule (manual)
37+
### Create a WAF rule (manual)
3538

3639
For users on the Free plan, or who want to define a more specific rule, you can create a [Custom WAF rule](/waf/custom-rules/create-dashboard/) to block requests with the `x-middleware-subrequest` header regardless of Next.js version.
3740

@@ -50,7 +53,7 @@ To create a custom rule:
5053

5154
![Next.js CVE-2025-29927 WAF rule](src/assets/images/changelog/workers/waf-rule-cve-2025-29927.png)
5255

53-
## Next.js CVE-2025-29927
56+
### Next.js CVE-2025-29927
5457

5558
We've made a WAF (Web Application Firewall) rule available to all sites on Cloudflare to protect against the [Next.js authentication bypass vulnerability](https://github.com/advisories/GHSA-f82v-jwr5-mffw) (`CVE-2025-29927`) published on March 21st, 2025.
5659

0 commit comments

Comments
 (0)