Skip to content

Commit 587a109

Browse files
Merge branch 'production' into patricia/pcx18133-turnstile-docs-v2
2 parents a81864d + e302db8 commit 587a109

File tree

46 files changed

+13361
-15425
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

46 files changed

+13361
-15425
lines changed

package-lock.json

Lines changed: 12632 additions & 15120 deletions
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

package.json

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -82,7 +82,7 @@
8282
"jsonc-parser": "3.3.1",
8383
"ldrs": "1.1.7",
8484
"lz-string": "1.5.0",
85-
"marked": "16.0.0",
85+
"marked": "16.1.1",
8686
"mdast-util-from-markdown": "2.0.2",
8787
"mdast-util-mdx": "3.0.0",
8888
"mdast-util-mdx-expression": "2.0.1",
@@ -100,7 +100,7 @@
100100
"react": "19.0.0",
101101
"react-dom": "19.0.0",
102102
"react-icons": "5.5.0",
103-
"react-instantsearch": "7.16.1",
103+
"react-instantsearch": "7.16.2",
104104
"react-markdown": "10.1.0",
105105
"react-select": "5.10.2",
106106
"redirects-in-workers": "0.0.7",
@@ -134,7 +134,7 @@
134134
"unist-util-visit": "5.0.0",
135135
"vite-tsconfig-paths": "5.1.4",
136136
"vitest": "2.1.6",
137-
"wrangler": "4.1.0"
137+
"wrangler": "4.26.0"
138138
},
139139
"engines": {
140140
"node": ">=22"

public/__redirects

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -143,6 +143,7 @@
143143
# ai-audit
144144
/ai-audit/features/detect-ai-crawlers/ /ai-audit/features/analyze-ai-crawlers/ 301
145145
/ai-audit/features/enforce-robots-txt/ /ai-audit/features/analyze-ai-crawlers/ 301
146+
/ai-audit/features/analyze-ai-crawlers/ /ai-audit/features/analyze-ai-traffic/ 301
146147

147148
# AI Gateway
148149
/ai-gateway/get-started/configuring-settings/ /ai-gateway/get-started/ 301
246 KB
Loading
72.5 KB
Loading

src/content/changelog/ai-audit/2025-07-01-refresh.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,4 +16,4 @@ We redesigned the AI Audit dashboard to provide more intuitive and granular cont
1616
To get started, explore:
1717

1818
- [Manage AI crawlers](/ai-audit/features/manage-ai-crawlers/).
19-
- [Analyze AI crawlers](/ai-audit/features/analyze-ai-crawlers/).
19+
- [Analyze AI traffic](/ai-audit/features/analyze-ai-traffic/).
Lines changed: 31 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,31 @@
1+
---
2+
title: Introducing pricing for the Browser Rendering API — $0.09 per browser hour
3+
description: Browser Rendering pricing announcement
4+
products:
5+
- browser-rendering
6+
date: 2025-07-28T12:00:00Z
7+
---
8+
9+
We’ve launched pricing for [Browser Rendering](/browser-rendering/), including a free tier and a pay-as-you-go model that scales with your needs. Starting **August 20, 2025**, Cloudflare will begin billing for Browser Rendering.
10+
11+
There are two ways to use Browser Rendering. Depending on the method you use, here’s how billing will work:
12+
- [**REST API**](/browser-rendering/rest-api/): Charged for **Duration** only ($/browser hour)
13+
- [**Workers Bindings**](/browser-rendering/workers-bindings/): Charged for both **Duration** and **Concurrency** ($/browser hour and # of concurrent browsers)
14+
15+
Included usage and pricing by plan
16+
17+
| Plan | Included duration | Included concurrency | Price (beyond included) |
18+
|----------------|---------------------------------------------------------------------------|-----------------------------------------------------------------------------------------------------------|----------|
19+
| **Workers Free** | 10 minutes per day | 3 concurrent browsers | N/A |
20+
| **Workers Paid** | 10 hours per month | 10 concurrent browsers (averaged monthly) | **1. REST API**: $0.09 per additional browser hour <br />**2. Workers Bindings**: $0.09 per additional browser hour <br /> $2.00 per additional concurrent browser |
21+
22+
23+
What you need to know:
24+
- **Workers Free Plan:** 10 minutes of browser usage per day with 3 concurrent browsers at no charge.
25+
- **Workers Paid Plan:** 10 hours of browser usage per month with 10 concurrent browsers (averaged monthly) at no charge. Additional usage is charged as shown above.
26+
27+
You can monitor usage via the [Cloudflare dashboard](https://dash.cloudflare.com/?to=/:account/workers/browser-rendering). Go to **Compute (Workers)** > **Browser Rendering**.
28+
29+
![Browser Rendering dashboard](~/assets/images/browser-rendering/dashboard.png)
30+
31+
If you've been using Browser Rendering and do not wish to incur charges, ensure your usage stays within your plan's [included usage](/browser-rendering/platform/pricing/). To estimate costs, take a look at these [example pricing scenarios](/browser-rendering/platform/pricing/#examples-of-workers-paid-pricing).

src/content/changelog/stream/2025-07-22-media-transformations-audio-mode.mdx

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,12 @@
11
---
2-
title: Audio mode for Media Transforamtions
2+
title: Audio mode for Media Transformations
33
description: >
44
Media Transformations now supports `audio` mode, which extracts audio from a video.
55
date: 2025-07-22
66
---
77

8-
The addition of this feature allows a user to extract audio from a source video, outputting
9-
an M4A file to use in downstream workflows like AI inference, content moderation, or transcription.
8+
We now support `audio` mode! Use this feature to extract audio from a source video, outputting
9+
an M4A file to use in downstream workflows like [AI inference](/workers-ai/), content moderation, or transcription.
1010

1111
For example,
1212

Lines changed: 93 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,93 @@
1+
---
2+
title: "WAF Release - 2025-07-28"
3+
description: Cloudflare WAF managed rulesets 2025-07-28 release
4+
date: 2025-07-28
5+
---
6+
7+
import { RuleID } from "~/components";
8+
9+
This week’s update spotlights several vulnerabilities across Apache Tomcat, MongoDB, and Fortinet FortiWeb. Several flaws related with a memory leak in Apache Tomcat can lead to a denial-of-service attack. Additionally, a code injection flaw in MongoDB's Mongoose library allows attackers to bypass security controls to access restricted data.
10+
11+
12+
**Key Findings**
13+
14+
- Fortinet FortiWeb (CVE-2025-25257): An improper neutralization of special elements used in a SQL command vulnerability in Fortinet FortiWeb versions allows an unauthenticated attacker to execute unauthorized SQL code or commands.
15+
16+
- Apache Tomcat (CVE-2025-31650): A improper Input Validation vulnerability in Apache Tomcat that could create memory leak when incorrect error handling for some invalid HTTP priority headers resulted in incomplete clean-up of the failed request.
17+
18+
- MongoDB (CVE-2024-53900, CVE:CVE-2025-23061): Improper use of `$where` in match and a nested `$where` filter with a `populate()` match in Mongoose can lead to search injection.
19+
20+
**Impact**
21+
22+
These vulnerabilities target user-facing components, web application servers, and back-end databases. A SQL injection flaw in Fortinet FortiWeb can lead to data theft or system compromise. A separate issue in Apache Tomcat involves a memory leak from improper input validation, which could be exploited for a denial-of-service (DoS) attack. Finally, a vulnerability in MongoDB's Mongoose library allows attackers to bypass security filters and access unauthorized data through malicious search queries.
23+
24+
<table style="width: 100%">
25+
<thead>
26+
<tr>
27+
<th>Ruleset</th>
28+
<th>Rule ID</th>
29+
<th>Legacy Rule ID</th>
30+
<th>Description</th>
31+
<th>Previous Action</th>
32+
<th>New Action</th>
33+
<th>Comments</th>
34+
</tr>
35+
</thead>
36+
<tbody>
37+
<tr>
38+
<td>Cloudflare Managed Ruleset</td>
39+
<td>
40+
<RuleID id="6ab3bd3b58fb4325ac2d3cc73461ec9e" />
41+
</td>
42+
<td>100804</td>
43+
<td>BerriAI - SSRF - CVE:CVE-2024-6587</td>
44+
<td>Log</td>
45+
<td>Disabled</td>
46+
<td>This is a New Detection</td>
47+
</tr>
48+
<tr>
49+
<td>Cloudflare Managed Ruleset</td>
50+
<td>
51+
<RuleID id="2e6c4d02f42a4c3ca90649d50cb13e1d" />
52+
</td>
53+
<td>100812</td>
54+
<td>Fortinet FortiWeb - Remote Code Execution - CVE:CVE-2025-25257</td>
55+
<td>Log</td>
56+
<td>Block</td>
57+
<td>This is a New Detection</td>
58+
</tr>
59+
<tr>
60+
<td>Cloudflare Managed Ruleset</td>
61+
<td>
62+
<RuleID id="fd360d8fd9994e6bab6fb06067fae7f7" />
63+
</td>
64+
<td>100813</td>
65+
<td>Apache Tomcat - DoS - CVE:CVE-2025-31650</td>
66+
<td>Log</td>
67+
<td>Disabled</td>
68+
<td>This is a New Detection</td>
69+
</tr>
70+
<tr>
71+
<td>Cloudflare Managed Ruleset</td>
72+
<td>
73+
<RuleID id="f9e01e28c5d6499cac66364b4b6a5bb1" />
74+
</td>
75+
<td>100815</td>
76+
<td>MongoDB - Remote Code Execution - CVE:CVE-2024-53900, CVE:CVE-2025-23061</td>
77+
<td>Log</td>
78+
<td>Block</td>
79+
<td>This is a New Detection</td>
80+
</tr>
81+
<tr>
82+
<td>Cloudflare Managed Ruleset</td>
83+
<td>
84+
<RuleID id="700d4fcc7b1f481a80cbeee5688f8e79" />
85+
</td>
86+
<td>100816</td>
87+
<td>MongoDB - Remote Code Execution - CVE:CVE-2024-53900, CVE:CVE-2025-23061</td>
88+
<td>Log</td>
89+
<td>Block</td>
90+
<td>This is a New Detection</td>
91+
</tr>
92+
</tbody>
93+
</table>
Lines changed: 86 additions & 57 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
2-
title: WAF Release - Scheduled changes for 2025-07-28
3-
description: WAF managed ruleset changes scheduled for 2025-07-28
4-
date: 2025-07-21
2+
title: WAF Release - Scheduled changes for 2025-08-04
3+
description: WAF managed ruleset changes scheduled for 2025-08-04
4+
date: 2025-07-28
55
scheduled: true
66
---
77

@@ -20,64 +20,93 @@ import { RuleID } from "~/components";
2020
</tr>
2121
</thead>
2222
<tbody>
23-
<tr>
24-
<td>2025-07-21</td>
23+
<tr>
2524
<td>2025-07-28</td>
25+
<td>2025-08-04</td>
2626
<td>Log</td>
27-
<td>100804</td>
27+
<td>100535A</td>
2828
<td>
29-
<RuleID id="6ab3bd3b58fb4325ac2d3cc73461ec9e" />
29+
<RuleID id="b8ab4644f8044f3485441ee052f30a13" />
3030
</td>
31-
<td>BerriAI - SSRF - CVE:CVE-2024-6587</td>
31+
<td>Sitecore - Dangerous File Upload - CVE:CVE-2025-34510, CVE:CVE-2025-34511</td>
3232
<td>This is a New Detection</td>
33-
</tr>
34-
<tr>
35-
<td>2025-07-21</td>
36-
<td>2025-07-28</td>
37-
<td>Log</td>
38-
<td>100812</td>
39-
<td>
40-
<RuleID id="2e6c4d02f42a4c3ca90649d50cb13e1d" />
41-
</td>
42-
<td>Fortinet FortiWeb - Remote Code Execution - CVE:CVE-2025-25257</td>
43-
<td>This is a New Detection</td>
44-
</tr>
45-
<tr>
46-
<td>2025-07-21</td>
47-
<td>2025-07-28</td>
48-
<td>Log</td>
49-
<td>100813</td>
50-
<td>
51-
<RuleID id="fd360d8fd9994e6bab6fb06067fae7f7" />
52-
</td>
53-
<td>Apache Tomcat - DoS - CVE:CVE-2025-31650</td>
54-
<td>This is a New Detection</td>
55-
</tr>
56-
<tr>
57-
<td>2025-07-21</td>
58-
<td>2025-07-28</td>
59-
<td>Log</td>
60-
<td>100815</td>
61-
<td>
62-
<RuleID id="f9e01e28c5d6499cac66364b4b6a5bb1" />
63-
</td>
64-
<td>
65-
MongoDB - Remote Code Execution - CVE:CVE-2024-53900, CVE:CVE-2025-23061
66-
</td>
67-
<td>This is a New Detection</td>
68-
</tr>
69-
<tr>
70-
<td>2025-07-21</td>
71-
<td>2025-07-28</td>
72-
<td>Log</td>
73-
<td>100816</td>
74-
<td>
75-
<RuleID id="700d4fcc7b1f481a80cbeee5688f8e79" />
76-
</td>
77-
<td>
78-
MongoDB - Remote Code Execution - CVE:CVE-2024-53900, CVE:CVE-2025-23061
79-
</td>
80-
<td>This is a New Detection</td>
81-
</tr>
33+
</tr>
34+
<tr>
35+
<td>2025-07-28</td>
36+
<td>2025-08-04</td>
37+
<td>Log</td>
38+
<td>100535</td>
39+
<td>
40+
<RuleID id="06d1fe0bd6e44d868e6b910b5045a97f" />
41+
</td>
42+
<td>Sitecore - Information Disclosure - CVE:CVE-2025-34509</td>
43+
<td>This is a New Detection</td>
44+
</tr>
45+
<tr>
46+
<td>2025-07-28</td>
47+
<td>2025-08-04</td>
48+
<td>Log</td>
49+
<td>100543</td>
50+
<td>
51+
<RuleID id="f71ce87ea6e54eab999223df579cd3e0" />
52+
</td>
53+
<td>Grafana - Directory Traversal - CVE:CVE-2025-4123</td>
54+
<td>This is a New Detection</td>
55+
</tr>
56+
<tr>
57+
<td>2025-07-28</td>
58+
<td>2025-08-04</td>
59+
<td>Log</td>
60+
<td>100545</td>
61+
<td>
62+
<RuleID id="bba3d37891a440fb8bc95b970cbd9abc" />
63+
</td>
64+
<td>WordPress - Information Disclosure - CVE:CVE-2023-5561</td>
65+
<td>This is a New Detection</td>
66+
</tr>
67+
<tr>
68+
<td>2025-07-28</td>
69+
<td>2025-08-04</td>
70+
<td>Log</td>
71+
<td>100820</td>
72+
<td>
73+
<RuleID id="28108d25f1cf470c8e7648938f634977" />
74+
</td>
75+
<td>CentOS WebPanel - Remote Code Execution - CVE:CVE-2025-48703</td>
76+
<td>This is a New Detection</td>
77+
</tr>
78+
<tr>
79+
<td>2025-07-28</td>
80+
<td>2025-08-04</td>
81+
<td>Log</td>
82+
<td>100821</td>
83+
<td>
84+
<RuleID id="9d69c796a61444a3aca33dc282ae64c1" />
85+
</td>
86+
<td>LaRecipe - SSTI - CVE:CVE-2025-53833</td>
87+
<td>This is a New Detection</td>
88+
</tr>
89+
<tr>
90+
<td>2025-07-28</td>
91+
<td>2025-08-04</td>
92+
<td>Log</td>
93+
<td>100822</td>
94+
<td>
95+
<RuleID id="9b5c5e13d2ca4253a89769f2194f7b2d" />
96+
</td>
97+
<td>WordPress:Plugin:WPBookit - Remote Code Execution - CVE:CVE-2025-6058</td>
98+
<td>This is a New Detection</td>
99+
</tr>
100+
<tr>
101+
<td>2025-07-28</td>
102+
<td>2025-08-04</td>
103+
<td>Log</td>
104+
<td>100823</td>
105+
<td>
106+
<RuleID id="69d43d704b0641898141a4300bf1b661" />
107+
</td>
108+
<td>WordPress:Theme:Motors - Privilege Escalation - CVE:CVE-2025-4322</td>
109+
<td>This is a New Detection</td>
110+
</tr>
82111
</tbody>
83112
</table>

0 commit comments

Comments
 (0)