|
| 1 | +--- |
| 2 | +title: "WAF Release - 2025-08-04" |
| 3 | +description: Cloudflare WAF managed rulesets 2025-08-04 release |
| 4 | +date: 2025-08-04 |
| 5 | +--- |
| 6 | + |
| 7 | +import { RuleID } from "~/components"; |
| 8 | + |
| 9 | +This week's highlight focuses on a series of significant vulnerabilities identified across widely adopted web platforms, from enterprise-grade CMS to essential backend administration tools. The findings reveal multiple vectors for attack, including critical flaws that allow for full server compromise and others that enable targeted attacks against users. |
| 10 | + |
| 11 | +**Key Findings** |
| 12 | + |
| 13 | +- Sitecore (CVE-2025-34509, CVE-2025-34510, CVE-2025-34511): A hardcoded credential allows remote attackers to access administrative APIs. Once authenticated, they can exploit an additional vulnerability to upload arbitrary files, leading to remote code execution. |
| 14 | + |
| 15 | +- Grafana (CVE-2025-4123): A cross-site scripting (XSS) vulnerability allows an attacker to redirect users to a malicious website, which can then execute arbitrary JavaScript in the victim's browser. |
| 16 | + |
| 17 | +- LaRecipe (CVE-2025-53833): Through Server-Side Template Injection, attackers can execute arbitrary commands on the server, potentially access sensitive environment variables and escalate access depending on server configuration. |
| 18 | + |
| 19 | +- CentOS WebPanel (CVE-2025-48703) A command injection vulnerability could allow a remote attacker to execute arbitrary commands on the server. |
| 20 | + |
| 21 | +- WordPress (CVE-2023-5561):This vulnerability allows unauthenticated attackers Unauthenticated attackers to determine the email addresses of users who have published public posts on an affected website. |
| 22 | + |
| 23 | +- WordPress Plugin - WPBookit (CVE-2025-6058): A nissing file type validation allows unauthenticated attackers to upload arbitrary files to the server, creating the potential for remote code execution. |
| 24 | + |
| 25 | +- WordPress Theme - Motors (CVE-2025-4322): Due to improper identity validation, an unauthenticated attacker can change the passwords of arbitrary users, including administrators, to gain access to their accounts. |
| 26 | + |
| 27 | +**Impact** |
| 28 | + |
| 29 | +These vulnerabilities pose a multi-layered threat to widely adopted web technologies, ranging from enterprise-grade platforms like Sitecore to everyday solutions such as WordPress and backend tools like CentOS WebPanel. The most severe risks originate in remote code execution (RCE) flaws found in Sitecore, CentOS WebPanel, LaRecipe, and the WPBookit plugin. These allow attackers to bypass security controls and gain deep access to the server, enabling them to steal sensitive data, deface websites, install persistent malware, or use the compromised server as a launchpad for further attacks. |
| 30 | + |
| 31 | +The privilege escalation vulnerability in the Motors theme, which allows for a complete administrative account takeover on WordPress sites. This effectively hands control of the application to an attacker, who can then manipulate content, exfiltrate user data, and alter site functionality without needing to breach the server itself. |
| 32 | + |
| 33 | +The Grafana cross-site scripting (XSS) flaw can be used to hijack authenticated user sessions or steal credentials, turning a trusted user's browser into an attack vector. |
| 34 | + |
| 35 | +Meanwhile, the information disclosure flaw in WordPress core provides attackers with valid user emails, fueling targeted phishing campaigns that aim to secure the same account access achievable through the other exploits. |
| 36 | + |
| 37 | +<table style="width: 100%"> |
| 38 | + <thead> |
| 39 | + <tr> |
| 40 | + <th>Ruleset</th> |
| 41 | + <th>Rule ID</th> |
| 42 | + <th>Legacy Rule ID</th> |
| 43 | + <th>Description</th> |
| 44 | + <th>Previous Action</th> |
| 45 | + <th>New Action</th> |
| 46 | + <th>Comments</th> |
| 47 | + </tr> |
| 48 | + </thead> |
| 49 | + <tbody> |
| 50 | + <tr> |
| 51 | + <td>Cloudflare Managed Ruleset</td> |
| 52 | + <td> |
| 53 | + <RuleID id="b8ab4644f8044f3485441ee052f30a13" /> |
| 54 | + </td> |
| 55 | + <td>100535A</td> |
| 56 | + <td>Sitecore - Dangerous File Upload - CVE:CVE-2025-34510, CVE:CVE-2025-34511</td> |
| 57 | + <td>Log</td> |
| 58 | + <td>Block</td> |
| 59 | + <td>This is a New Detection</td> |
| 60 | + </tr> |
| 61 | + <tr> |
| 62 | + <td>Cloudflare Managed Ruleset</td> |
| 63 | + <td> |
| 64 | + <RuleID id="06d1fe0bd6e44d868e6b910b5045a97f" /> |
| 65 | + </td> |
| 66 | + <td>100535</td> |
| 67 | + <td>Sitecore - Information Disclosure - CVE:CVE-2025-34509</td> |
| 68 | + <td>Log</td> |
| 69 | + <td>Block</td> |
| 70 | + <td>This is a New Detection</td> |
| 71 | + </tr> |
| 72 | + <tr> |
| 73 | + <td>Cloudflare Managed Ruleset</td> |
| 74 | + <td> |
| 75 | + <RuleID id="f71ce87ea6e54eab999223df579cd3e0" /> |
| 76 | + </td> |
| 77 | + <td>100543</td> |
| 78 | + <td>Grafana - Directory Traversal - CVE:CVE-2025-4123</td> |
| 79 | + <td>Log</td> |
| 80 | + <td>Block</td> |
| 81 | + <td>This is a New Detection</td> |
| 82 | + </tr> |
| 83 | + <tr> |
| 84 | + <td>Cloudflare Managed Ruleset</td> |
| 85 | + <td> |
| 86 | + <RuleID id="bba3d37891a440fb8bc95b970cbd9abc" /> |
| 87 | + </td> |
| 88 | + <td>100545</td> |
| 89 | + <td>WordPress - Information Disclosure - CVE:CVE-2023-5561</td> |
| 90 | + <td>Log</td> |
| 91 | + <td>Block</td> |
| 92 | + <td>This is a New Detection</td> |
| 93 | + </tr> |
| 94 | + <tr> |
| 95 | + <td>Cloudflare Managed Ruleset</td> |
| 96 | + <td> |
| 97 | + <RuleID id="28108d25f1cf470c8e7648938f634977" /> |
| 98 | + </td> |
| 99 | + <td>100814</td> |
| 100 | + <td>CentOS WebPanel - Remote Code Execution - CVE:CVE-2025-48703</td> |
| 101 | + <td>Log</td> |
| 102 | + <td>Block</td> |
| 103 | + <td>This is a New Detection</td> |
| 104 | + </tr> |
| 105 | + <tr> |
| 106 | + <td>Cloudflare Managed Ruleset</td> |
| 107 | + <td> |
| 108 | + <RuleID id="9d69c796a61444a3aca33dc282ae64c1" /> |
| 109 | + </td> |
| 110 | + <td>100821</td> |
| 111 | + <td>LaRecipe - SSTI - CVE:CVE-2025-53833</td> |
| 112 | + <td>Log</td> |
| 113 | + <td>Block</td> |
| 114 | + <td>This is a New Detection</td> |
| 115 | + </tr> |
| 116 | + <tr> |
| 117 | + <td>Cloudflare Managed Ruleset</td> |
| 118 | + <td> |
| 119 | + <RuleID id="9b5c5e13d2ca4253a89769f2194f7b2d" /> |
| 120 | + </td> |
| 121 | + <td>100822</td> |
| 122 | + <td>WordPress:Plugin:WPBookit - Remote Code Execution - CVE:CVE-2025-6058</td> |
| 123 | + <td>Log</td> |
| 124 | + <td>Block</td> |
| 125 | + <td>This is a New Detection</td> |
| 126 | + </tr> |
| 127 | + <tr> |
| 128 | + <td>Cloudflare Managed Ruleset</td> |
| 129 | + <td> |
| 130 | + <RuleID id="69d43d704b0641898141a4300bf1b661" /> |
| 131 | + </td> |
| 132 | + <td>100823</td> |
| 133 | + <td>WordPress:Theme:Motors - Privilege Escalation - CVE:CVE-2025-4322</td> |
| 134 | + <td>Log</td> |
| 135 | + <td>Block</td> |
| 136 | + <td>This is a New Detection</td> |
| 137 | + </tr> |
| 138 | + </tbody> |
| 139 | +</table> |
0 commit comments