Skip to content

Commit 3b18b78

Browse files
Merge branch 'production' into patricia/pcx18133-turnstile-docs-v2
2 parents b054bc1 + b9ec94a commit 3b18b78

File tree

202 files changed

+8656
-681
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

202 files changed

+8656
-681
lines changed

.github/pull_request_template.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -10,6 +10,7 @@
1010

1111
<!-- Remove items that do not apply -->
1212

13+
- [ ] Is there a [changelog](https://developers.cloudflare.com/changelog/) entry ([guidelines](https://developers.cloudflare.com/style-guide/documentation-content-strategy/content-types/changelog/))? If you don't add one for something awesome and new (however small) — how will our customers find out? Changelogs are automatically posted to [RSS feeds](https://developers.cloudflare.com/fundamentals/new-features/available-rss-feeds/), the [Discord](https://discord.com/channels/595317990191398933/1040420029080018945), and [X](https://x.com/CFchangelog).
1314
- [ ] The [documentation style guide](https://developers.cloudflare.com/style-guide/) has been adhered to.
1415
- [ ] If a larger change - such as adding a new page- an issue has been opened in relation to any incorrect or out of date information that this PR fixes.
1516
- [ ] Files which have changed name or location have been allocated [redirects](https://developers.cloudflare.com/pages/configuration/redirects/#per-file).

public/__redirects

Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -38,6 +38,13 @@
3838
/waf/change-log/index.xml /changelog/rss/waf.xml 301
3939
/waf/change-log/general-updates/index.xml /changelog/rss/waf.xml 301
4040

41+
## area changelog feeds
42+
43+
/fundamentals/reference/changelog/performance/index.xml /changelog/rss/application-performance.xml 301
44+
/fundamentals/reference/changelog/platform/index.xml /changelog/rss/core-platform.xml 301
45+
/fundamentals/reference/changelog/security/index.xml /changelog/rss/application-security.xml 301
46+
/workers/platform/changelog/platform/index.xml /changelog/rss/developer-platform.xml 301
47+
4148
## legacy
4249
/release-notes/index.xml /changelog/rss/index.xml 301
4350
/release-notes/ /changelog/ 301
@@ -1241,6 +1248,8 @@
12411248
/security-center/indicator-feeds/get-started/ /security-center/indicator-feeds/ 301
12421249

12431250
# spectrum
1251+
/spectrum/changelog/ /spectrum/ 301
1252+
/spectrum/changelog/index.xml /changelog/rss/index.xml 301
12441253
/spectrum/getting-started/ /spectrum/get-started/ 301
12451254
/spectrum/getting-started/byoip/ /spectrum/about/byoip/ 301
12461255
/spectrum/getting-started/getting-started/ /spectrum/get-started/ 301
@@ -1514,6 +1523,10 @@
15141523
# time-services_redirects
15151524
/time-services/nts/usage/ /time-services/nts/ 301
15161525

1526+
# tenant
1527+
/tenant/changelog/ /tenant/ 301
1528+
/tenant/changelog/index.xml /changelog/rss/index.xml 301
1529+
15171530
# turnstile
15181531
/turnstile/get-started/domain-management/ /turnstile/reference/domain-management/ 301
15191532
/turnstile/get-started/migrating-from-recaptcha/ /turnstile/migration/recaptcha/ 301
@@ -1618,6 +1631,8 @@
16181631

16191632
# waiting-room
16201633
/waiting-room/how-to/mobile-traffic/ /waiting-room/how-to/json-response/ 301
1634+
/waiting-room/changelog/ /waiting-room/ 301
1635+
/waiting-room/changelog/index.xml /changelog/rss/index.xml 301
16211636

16221637
# warp-client
16231638
/warp-client/get-started/macOS/ /warp-client/get-started/macos/ 301

src/assets/images/reference-architecture/fullstack-app/fullstack-app-base.svg

Lines changed: 7692 additions & 1 deletion
Loading

src/components/ProductReleaseNotes.astro

Lines changed: 9 additions & 25 deletions
Original file line numberDiff line numberDiff line change
@@ -16,11 +16,10 @@ if (!page) {
1616
}
1717
1818
if (
19-
!page.data.release_notes_file_name &&
20-
!page.data.release_notes_product_area_name
19+
!page.data.release_notes_file_name
2120
) {
2221
throw new Error(
23-
`[ProductReleaseNotes] ${Astro.params.slug} does not have a 'release_notes_file_name' or 'changaelog_product_area_name' frontmatter property.`,
22+
`[ProductReleaseNotes] ${Astro.params.slug} does not have a 'release_notes_file_name' frontmatter property.`,
2423
);
2524
}
2625
@@ -34,37 +33,22 @@ if (
3433
}
3534
3635
const name =
37-
page.data.release_notes_product_area_name ??
3836
page.data.release_notes_file_name?.[0];
3937
4038
let releaseNotes;
4139
42-
if (page.data.release_notes_product_area_name) {
40+
if (name === "api-deprecations") {
41+
const opts = {
42+
deprecationsOnly: true,
43+
};
44+
({ releaseNotes } = await getReleaseNotes(opts));
45+
} else {
4346
const opts = {
4447
filter: (entry: CollectionEntry<"release-notes">) => {
45-
return entry.data.productArea === name;
48+
return entry.id === name;
4649
},
4750
};
4851
({ releaseNotes } = await getReleaseNotes(opts));
49-
} else {
50-
if (name === "wrangler") {
51-
const opts = {
52-
wranglerOnly: true,
53-
};
54-
({ releaseNotes } = await getReleaseNotes(opts));
55-
} else if (name === "api-deprecations") {
56-
const opts = {
57-
deprecationsOnly: true,
58-
};
59-
({ releaseNotes } = await getReleaseNotes(opts));
60-
} else {
61-
const opts = {
62-
filter: (entry: CollectionEntry<"release-notes">) => {
63-
return entry.id === name;
64-
},
65-
};
66-
({ releaseNotes } = await getReleaseNotes(opts));
67-
}
6852
}
6953
7054
if (!releaseNotes) {

src/content/changelog/waf/2025-08-04-waf-release.mdx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -96,7 +96,7 @@ Meanwhile, the information disclosure flaw in WordPress core provides attackers
9696
<td>
9797
<RuleID id="28108d25f1cf470c8e7648938f634977" />
9898
</td>
99-
<td>100814</td>
99+
<td>100820</td>
100100
<td>CentOS WebPanel - Remote Code Execution - CVE:CVE-2025-48703</td>
101101
<td>Log</td>
102102
<td>Block</td>
@@ -136,4 +136,4 @@ Meanwhile, the information disclosure flaw in WordPress core provides attackers
136136
<td>This is a New Detection</td>
137137
</tr>
138138
</tbody>
139-
</table>
139+
</table>
Lines changed: 61 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,61 @@
1+
---
2+
title: "WAF Release - 2025-08-07 - Emergency"
3+
description: Cloudflare WAF managed rulesets 2025-08-07 emergency release
4+
date: 2025-08-07
5+
---
6+
7+
import { RuleID } from "~/components";
8+
9+
This week’s highlight focuses on two critical vulnerabilities affecting key infrastructure and enterprise content management platforms. Both flaws present significant remote code execution risks that can be exploited with minimal or no user interaction.
10+
11+
**Key Findings**
12+
13+
- Squid (≤6.3) — CVE-2025-54574: A heap buffer overflow occurs when processing Uniform Resource Names (URNs). This vulnerability may allow remote attackers to execute arbitrary code on the server. The issue has been resolved in version 6.4.
14+
15+
- Adobe AEM (≤6.5.23) — CVE-2025-54253: Due to a misconfiguration, attackers can achieve remote code execution without requiring any user interaction, posing a severe threat to affected deployments.
16+
17+
**Impact**
18+
19+
Both vulnerabilities expose critical attack vectors that can lead to full server compromise. The Squid heap buffer overflow allows remote code execution by crafting malicious URNs, which can lead to server takeover or denial of service. Given Squid’s widespread use as a caching proxy, this flaw could be exploited to disrupt network traffic or gain footholds inside secure environments.
20+
21+
Adobe AEM’s remote code execution vulnerability enables attackers to run arbitrary code on the content management server without any user involvement. This puts sensitive content, application integrity, and the underlying infrastructure at extreme risk. Exploitation could lead to data theft, defacement, or persistent backdoor installation.
22+
23+
These findings reinforce the urgency of updating to the patched versions — Squid 6.4 and Adobe AEM 6.5.24 or later — and reviewing configurations to prevent exploitation.
24+
25+
<table style="width: 100%">
26+
<thead>
27+
<tr>
28+
<th>Ruleset</th>
29+
<th>Rule ID</th>
30+
<th>Legacy Rule ID</th>
31+
<th>Description</th>
32+
<th>Previous Action</th>
33+
<th>New Action</th>
34+
<th>Comments</th>
35+
</tr>
36+
</thead>
37+
<tbody>
38+
<tr>
39+
<td>Cloudflare Managed Ruleset</td>
40+
<td>
41+
<RuleID id="f61ed7c1e7e24c3380289e41ef7e015b" />
42+
</td>
43+
<td>100844</td>
44+
<td>Adobe Experience Manager Forms - Remote Code Execution - CVE:CVE-2025-54253</td>
45+
<td>N/A</td>
46+
<td>Block</td>
47+
<td>This is a New Detection</td>
48+
</tr>
49+
<tr>
50+
<td>Cloudflare Managed Ruleset</td>
51+
<td>
52+
<RuleID id="e76e65f5a3aa43f49e0684a6baec057a" />
53+
</td>
54+
<td>100840</td>
55+
<td>Squid - Buffer Overflow - CVE:CVE-2025-54574</td>
56+
<td>N/A</td>
57+
<td>Block</td>
58+
<td>This is a New Detection</td>
59+
</tr>
60+
</tbody>
61+
</table>

src/content/changelog/workers/2025-07-01-workers-deploy-button-supports-environment-variables-and-secrets.mdx

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -3,6 +3,7 @@ title: Deploy to Cloudflare buttons now support Worker environment variables, se
33
description: Worker environment variables, secrets, and Secrets Store secrets can now be used in Workers templates
44
products:
55
- workers
6+
- secrets-store
67
date: 2025-07-29T01:00:00Z
78
---
89

src/content/docs/api-shield/management-and-monitoring/endpoint-management/index.mdx

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -114,7 +114,6 @@ If you deselect **Save new endpoints to endpoint management**, the endpoints wil
114114

115115
### Add endpoints manually
116116

117-
118117
<Tabs syncKey="dashNewNav">
119118
<TabItem label="Old dashboard">
120119
<Steps>
@@ -192,7 +191,7 @@ For each saved endpoint, customers can view:
192191
- **Error rate** vs. overall traffic: grouped by 4xx, 5xx, and their sum.
193192
- **Response size**: The average size of the response (in bytes) returned to the request.
194193
- **Labels**: The current [labels](/api-shield/management-and-monitoring/endpoint-labels/) assigned to the endpoint.
195-
- **Authentication status**: The breakdown of which [session identifiers](/api-shield/get-started/#session-identifiers) were seen on successful requests to this endpoint.
194+
- **[Authentication status](/api-shield/security/authentication-posture/)**: The breakdown of which [session identifiers](/api-shield/get-started/#session-identifiers) were seen on successful requests to this endpoint.
196195
- **Sequences**: The number of [Sequence Analytics](/api-shield/security/sequence-analytics/) sequences the endpoint was found in.
197196

198197
:::note

src/content/docs/bots/additional-configurations/managed-robots-txt.mdx

Lines changed: 12 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -10,8 +10,6 @@ import { Render, Tabs, TabItem, Steps } from "~/components";
1010

1111
Protect your website or application from AI crawlers by implementing a `robots.txt` file on your domain to direct AI bot operators on what content they can and cannot scrape for AI model training.
1212

13-
Cloudflare's managed `robots.txt` explicitly disallows known bots engaged in scraping for AI purposes.
14-
1513
AI bots are expected to follow the `robots.txt` directives.
1614

1715
:::note
@@ -37,7 +35,18 @@ Disallow: /langtest
3735
Sitemap: https://www.crawlstop.com/sitemap.xml
3836
```
3937

40-
With the managed `robots.txt` enabled, Cloudflare will prepend our managed content before your original content, resulting in what you can view at https://crawlstop.com/robots.txt.
38+
With the managed `robots.txt` enabled, Cloudflare will prepend our managed content before your original content, resulting in what you can view at https://www.crawlstop.com/robots.txt.
39+
40+
**Robots.txt example**
41+
<div style="position: relative; padding-top: 56.25%; border: 1px solid orange; border-radius: 5px">
42+
<iframe
43+
src="https://www.crawlstop.com/robots.txt"
44+
style="border: none; position: absolute; top: 0; left: 0; height: 100%; width: 100%;"
45+
allowfullscreen="true"
46+
title="crawltop.com robots.txt file"
47+
>
48+
</iframe>
49+
</div>
4150

4251
### No robots.txt file
4352

src/content/docs/browser-rendering/faq.mdx

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -90,3 +90,7 @@ If you are hitting concurrency limits, or would like to better manage concurrent
9090
- [Reuse sessions](/browser-rendering/workers-bindings/reuse-sessions/): You can optimize your setup and decrease startup time by reusing sessions instead of launching a new browser every time. If you are concerned about maintaining test isolation, for example for tests that depend on a clean environment, we recommend using [incognito browser contexts](https://pptr.dev/api/puppeteer.browser.createbrowsercontext), which isolate cookies and cache with other sessions.
9191

9292
If you are still running into concurrency limits you can [request a higher limit](https://forms.gle/CdueDKvb26mTaepa9).
93+
94+
### Is there a limit to how many requests a single browser session can handle?
95+
96+
No, there is not a fixed limit on the number of requests per browser session. A single browser can handle multiple requests as long as it stays within the available compute and memory limits.

0 commit comments

Comments
 (0)