|
| 1 | +--- |
| 2 | +title: "WAF Release - 2025-09-22" |
| 3 | +description: Cloudflare WAF managed rulesets 2025-09-22 release |
| 4 | +date: 2025-09-22 |
| 5 | +--- |
| 6 | + |
| 7 | +import { RuleID } from "~/components"; |
| 8 | + |
| 9 | +This week emphasizes two critical vendor-specific vulnerabilities: a full elevation-of-privilege in Microsoft Azure Networking (CVE-2025-54914) and a server-side template injection (SSTI) leading to remote code execution (RCE) in Skyvern (CVE-2025-49619). These are complemented by enhancements in generic detections (SQLi, SSRF) to improve baseline coverage. |
| 10 | + |
| 11 | +**Key Findings** |
| 12 | + |
| 13 | + |
| 14 | +* Azure (CVE-2025-54914): Vulnerability in Azure Networking allowing elevation of privileges. |
| 15 | + |
| 16 | +* Skyvern (CVE-2025-49619): Skyvern ≤ 0.1.85 has a server-side template injection (SSTI) vulnerability in its Prompt field (workflow blocks) via Jinja2. Authenticated users with low privileges can get remote code execution (blind). |
| 17 | + |
| 18 | +* Generic SQLi / SSRF improvements: Expanded rule coverage to detect obfuscated SQL injection patterns and SSRF across host, local, and cloud contexts. |
| 19 | + |
| 20 | +**Impact** |
| 21 | + |
| 22 | +These vulnerabilities allow attackers to escalate privileges or execute code under conditions where previously they could not: |
| 23 | + |
| 24 | +* Azure CVE-2025-54914 enables an attacker from the network with no credentials to gain high-level access within Azure Networking; could lead to full compromise of networking components. |
| 25 | + |
| 26 | +* Skyvern CVE-2025-49619 allows authenticated users with minimal privilege to exploit SSTI for remote code execution, undermining isolation of workflow components. |
| 27 | + |
| 28 | +* The improvements for SQLi and SSRF reduce risk from common injection and request-based attacks. |
| 29 | + |
| 30 | + |
| 31 | +<table style="width: 100%"> |
| 32 | + <thead> |
| 33 | + <tr> |
| 34 | + <th>Ruleset</th> |
| 35 | + <th>Rule ID</th> |
| 36 | + <th>Legacy Rule ID</th> |
| 37 | + <th>Description</th> |
| 38 | + <th>Previous Action</th> |
| 39 | + <th>New Action</th> |
| 40 | + <th>Comments</th> |
| 41 | + </tr> |
| 42 | + </thead> |
| 43 | + <tbody> |
| 44 | + <tr> |
| 45 | + <td>Cloudflare Managed Ruleset</td> |
| 46 | + <td> |
| 47 | + <RuleID id="c36a425ae0c94789a9bc34f06a135cbf" /> |
| 48 | + </td> |
| 49 | + <td>100146</td> |
| 50 | + <td>SSRF - Host - 2</td> |
| 51 | + <td>Log</td> |
| 52 | + <td>Disabled</td> |
| 53 | + <td>This is a New Detection</td> |
| 54 | + </tr> |
| 55 | + <tr> |
| 56 | + <td>Cloudflare Managed Ruleset</td> |
| 57 | + <td> |
| 58 | + <RuleID id="dfa84b0aed5a4b45b953a36a57035abf" /> |
| 59 | + </td> |
| 60 | + <td>100146B</td> |
| 61 | + <td>SSRF - Local - 2</td> |
| 62 | + <td>Log</td> |
| 63 | + <td>Disabled</td> |
| 64 | + <td>This is a New Detection</td> |
| 65 | + </tr> |
| 66 | + <tr> |
| 67 | + <td>Cloudflare Managed Ruleset</td> |
| 68 | + <td> |
| 69 | + <RuleID id="276073e60c7a4b4d91faba1fbbe18d50" /> |
| 70 | + </td> |
| 71 | + <td>100146C</td> |
| 72 | + <td>SSRF - Cloud - 2</td> |
| 73 | + <td>Log</td> |
| 74 | + <td>Disabled</td> |
| 75 | + <td>This is a New Detection</td> |
| 76 | + </tr> |
| 77 | + <tr> |
| 78 | + <td>Cloudflare Managed Ruleset</td> |
| 79 | + <td> |
| 80 | + <RuleID id="78c856218f2d40f4b5988c8c956c1961" /> |
| 81 | + </td> |
| 82 | + <td>100714</td> |
| 83 | + <td>Azure - Auth Bypass - CVE:CVE-2025-54914</td> |
| 84 | + <td>Log</td> |
| 85 | + <td>block</td> |
| 86 | + <td>This is a New Detection</td> |
| 87 | + </tr> |
| 88 | + <tr> |
| 89 | + <td>Cloudflare Managed Ruleset</td> |
| 90 | + <td> |
| 91 | + <RuleID id="9f1c8d4cbf3848dbb940771bc5ced231" /> |
| 92 | + </td> |
| 93 | + <td>100758</td> |
| 94 | + <td>Skyvern - Remote Code Execution - CVE:CVE-2025-49619</td> |
| 95 | + <td>Log</td> |
| 96 | + <td>block</td> |
| 97 | + <td>This is a New Detection</td> |
| 98 | + </tr> |
| 99 | + <tr> |
| 100 | + <td>Cloudflare Managed Ruleset</td> |
| 101 | + <td> |
| 102 | + <RuleID id="6be7e7829f3b43c688e1ac4284a619a1" /> |
| 103 | + </td> |
| 104 | + <td>100773</td> |
| 105 | + <td>Next.js - SSRF</td> |
| 106 | + <td>Log</td> |
| 107 | + <td>Block</td> |
| 108 | + <td>This is a New Detection</td> |
| 109 | + </tr> |
| 110 | + <tr> |
| 111 | + <td>Cloudflare Managed Ruleset</td> |
| 112 | + <td> |
| 113 | + <RuleID id="0cc3f50216bf4b448210bcc3983ff2dd" /> |
| 114 | + </td> |
| 115 | + <td>100774</td> |
| 116 | + <td>Adobe Commerce - Remote Code Execution - CVE:CVE-2025-54236</td> |
| 117 | + <td>Log</td> |
| 118 | + <td>Block</td> |
| 119 | + <td>This is a New Detection</td> |
| 120 | + </tr> |
| 121 | + <tr> |
| 122 | + <td>Cloudflare Managed Ruleset</td> |
| 123 | + <td> |
| 124 | + <RuleID id="53bfaeb311a049e3877fa15c0380a1a6" /> |
| 125 | + </td> |
| 126 | + <td>100800_BETA</td> |
| 127 | + <td>SQLi - Obfuscated Boolean - Beta</td> |
| 128 | + <td>Log</td> |
| 129 | + <td>Block</td> |
| 130 | + <td>This rule has been merged into the original rule (ID: <RuleID id="7663ea44178441a0b3205c145563445f" /></td> |
| 131 | + </tr> |
| 132 | + </tbody> |
| 133 | +</table> |
0 commit comments