You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: src/content/docs/waf/change-log/2025-05-19.mdx
+5-6Lines changed: 5 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,22 +9,21 @@ tableOfContents: false
9
9
10
10
import { RuleID } from"~/components";
11
11
12
-
This week's analysis covers 4 vulnerabilities, with three rated critical due to Remote Code Execution (RCE) potential. One targets a high-traffic frontend platform, while another targets a popular content management system. These detections are now part of our Managed Ruleset in Block mode.
12
+
This week's analysis covers four vulnerabilities, with three rated critical due to their Remote Code Execution (RCE) potential. One targets a high-traffic frontend platform, while another targets a popular content management system. These detections are now part of the Cloudflare Managed Ruleset in _Block_ mode.
13
13
14
14
**Key Findings**
15
15
16
16
- Commvault Command Center (CVE-2025-34028) exposes an unauthenticated RCE via insecure command injection paths in the web UI. This is critical due to its use in enterprise backup environments.
17
17
- BentoML (CVE-2025-27520) reveals an exploitable vector where serialized payloads in model deployment APIs can lead to arbitrary command execution. This targets modern AI/ML infrastructure.
18
18
- Craft CMS (CVE-2024-56145) allows RCE through template injection in unauthenticated endpoints. It poses a significant risk for content-heavy websites with plugin extensions.
19
-
- Apache HTTP Server (CVE-2024-38475) discloses sensitive server config data due to misconfigured mod_proxy behavior. While not RCE, it’s useful for pre-attack recon.
19
+
- Apache HTTP Server (CVE-2024-38475) discloses sensitive server config data due to misconfigured
20
+
`mod_proxy` behavior. While not RCE, this is useful for pre-attack recon.
20
21
21
22
**Impact**
22
23
23
-
These newly detected vulnerabilities introduce critical risk across modern web stacks, AI infrastructure, and content platforms:
24
-
Unauthenticated RCEs in Commvault, BentoML, and Craft CMS enable full system compromise with minimal attacker effort.
24
+
These newly detected vulnerabilities introduce critical risk across modern web stacks, AI infrastructure, and content platforms: unauthenticated RCEs in Commvault, BentoML, and Craft CMS enable full system compromise with minimal attacker effort.
25
25
26
-
Apache HTTPD information leak can support targeted reconnaissance, increasing the success rate of follow-up exploits.
27
-
Organizations using these platforms should prioritize patching and monitor for indicators of exploitation using updated WAF detection rules.
26
+
Apache HTTPD information leak can support targeted reconnaissance, increasing the success rate of follow-up exploits. Organizations using these platforms should prioritize patching and monitor for indicators of exploitation using updated WAF detection rules.
0 commit comments