Skip to content

Commit 31a7c70

Browse files
authored
waf-release-oct-13-2025 (#25801)
1 parent 207ba96 commit 31a7c70

File tree

2 files changed

+63
-8
lines changed

2 files changed

+63
-8
lines changed
Lines changed: 44 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,44 @@
1+
---
2+
title: "WAF Release - 2025-10-13"
3+
description: Cloudflare WAF managed rulesets 2025-10-13 release
4+
date: 2025-10-13
5+
---
6+
7+
import { RuleID } from "~/components";
8+
9+
This week’s highlights include a new JinJava rule targeting a sandbox-bypass flaw that could allow malicious template input to escape execution controls. The rule improves detection for unsafe template rendering paths.
10+
11+
**Key Findings**
12+
13+
New WAF rule deployed for JinJava (CVE-2025-59340) to block a sandbox bypass in the template engine that permits attacker-controlled type construction and arbitrary class instantiation; in vulnerable environments this can escalate to remote code execution and full server compromise.
14+
15+
**Impact**
16+
17+
- CVE-2025-59340 — Exploitation enables attacker-supplied type descriptors / Jackson `ObjectMapper` abuse, allowing arbitrary class loading, file/URL access (LFI/SSRF primitives) and, with suitable gadget chains, potential remote code execution and system compromise.
18+
19+
<table style="width: 100%">
20+
<thead>
21+
<tr>
22+
<th>Ruleset</th>
23+
<th>Rule ID</th>
24+
<th>Legacy Rule ID</th>
25+
<th>Description</th>
26+
<th>Previous Action</th>
27+
<th>New Action</th>
28+
<th>Comments</th>
29+
</tr>
30+
</thead>
31+
<tbody>
32+
<tr>
33+
<td>Cloudflare Managed Ruleset</td>
34+
<td>
35+
<RuleID id="b327d6442e2d4848b4aab3cbc04bab5f" />
36+
</td>
37+
<td>100892</td>
38+
<td>JinJava - SSTI - CVE:CVE-2025-59340</td>
39+
<td>Log</td>
40+
<td>Block</td>
41+
<td>This is a New Detection</td>
42+
</tr>
43+
</tbody>
44+
</table>

src/content/changelog/waf/scheduled-waf-release.mdx

Lines changed: 19 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
2-
title: WAF Release - Scheduled changes for 2025-10-13
3-
description: WAF managed ruleset changes scheduled for 2025-10-13
4-
date: 2025-10-06
2+
title: WAF Release - Scheduled changes for 2025-10-20
3+
description: WAF managed ruleset changes scheduled for 2025-10-20
4+
date: 2025-10-13
55
scheduled: true
66
---
77

@@ -21,15 +21,26 @@ import { RuleID } from "~/components";
2121
</thead>
2222
<tbody>
2323
<tr>
24-
<td>2025-10-06</td>
2524
<td>2025-10-13</td>
25+
<td>2025-10-20</td>
2626
<td>Log</td>
27-
<td>100892</td>
27+
<td>100598A</td>
2828
<td>
29-
<RuleID id="b327d6442e2d4848b4aab3cbc04bab5f" />
29+
<RuleID id="933fc13202cd4e8ba498c0f32b4101ab" />
3030
</td>
31-
<td>JinJava - SSTI - CVE:CVE-2025-59340</td>
32-
<td>This is a New Detection</td>
31+
<td>Remote Code Execution - Common Bash Bypass - Beta</td>
32+
<td>This rule is merged into the original rule "Remote Code Execution - Common Bash Bypass" (ID: <RuleID id="f8238867ed3e4d3a9a7b731a50cec478" />)</td>
3333
</tr>
34+
<tr>
35+
<td>2025-10-13</td>
36+
<td>2025-10-20</td>
37+
<td>Log</td>
38+
<td>100916A</td>
39+
<td>
40+
<RuleID id="185b5df42d1e44e0aeb8f8b8a1118614" />
41+
</td>
42+
<td>Oracle E-Business Suite - Remote Code Execution - CVE:CVE-2025-61882 - 2</td>
43+
<td>This is a New Detection</td>
44+
</tr>
3445
</tbody>
3546
</table>

0 commit comments

Comments
 (0)