Skip to content

Commit e03b43c

Browse files
authored
WAFMR Release Fixes (#25000)
1 parent b4e66c4 commit e03b43c

File tree

2 files changed

+10
-13
lines changed

2 files changed

+10
-13
lines changed

src/content/changelog/waf/2025-09-08-waf-release.mdx

Lines changed: 9 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -6,31 +6,28 @@ date: 2025-09-08
66

77
import { RuleID } from "~/components";
88

9-
This week's update
9+
**This week's update**
1010

1111
This week’s focus highlights newly disclosed vulnerabilities in web frameworks, enterprise applications, and widely deployed CMS plugins. The vulnerabilities include SSRF, authentication bypass, arbitrary file upload, and remote code execution (RCE), exposing organizations to high-impact risks such as unauthorized access, system compromise, and potential data exposure. In addition, security rule enhancements have been deployed to cover general command injection and server-side injection attacks, further strengthening protections.
1212

13-
1413
**Key Findings**
1514

16-
* Next.js (CVE-2025-57822): Improper handling of redirects in custom middleware can lead to server-side request forgery (SSRF) when user-supplied headers are forwarded. Attackers could exploit this to access internal services or cloud metadata endpoints. The issue has been resolved in versions 14.2.32 and 15.4.7. Developers using custom middleware should upgrade and verify proper redirect handling in next() calls.
15+
* Next.js (CVE-2025-57822): Improper handling of redirects in custom middleware can lead to server-side request forgery (SSRF) when user-supplied headers are forwarded. Attackers could exploit this to access internal services or cloud metadata endpoints. The issue has been resolved in versions 14.2.32 and 15.4.7. Developers using custom middleware should upgrade and verify proper redirect handling in `next()` calls.
1716

18-
* ScriptCase (CVE-2025-47227,CVE-2025-47228):In the Production Environment extension in Netmake ScriptCase through 9.12.006 (23), two vulnerabilities allow attackers to reset admin accounts and execute system commands, potentially leading to full compromise of affected deployments.
17+
* ScriptCase (CVE-2025-47227, CVE-2025-47228): In the Production Environment extension in Netmake ScriptCase through 9.12.006 (23), two vulnerabilities allow attackers to reset admin accounts and execute system commands, potentially leading to full compromise of affected deployments.
1918

20-
* Sar2HTML (CVE-2025-34030): In Sar2HTML version 3.2.2 and prior, insufficient input sanitization of the plot parameter allows remote, unauthenticated attackers to execute arbitrary system commands. Exploitation could compromise the underlying server and its data.
19+
* Sar2HTML (CVE-2025-34030): In Sar2HTML version 3.2.2 and earlier, insufficient input sanitization of the plot parameter allows remote, unauthenticated attackers to execute arbitrary system commands. Exploitation could compromise the underlying server and its data.
2120

22-
* Zhiyuan OA (CVE-2025-34040): An arbitrary file upload vulnerability exists in the Zhiyuan OA platform. Improper validation in the wpsAssistServlet interface allows unauthenticated attackers to upload crafted files via path traversal, which can be executed on the web server, leading to remote code execution.
21+
* Zhiyuan OA (CVE-2025-34040): An arbitrary file upload vulnerability exists in the Zhiyuan OA platform. Improper validation in the `wpsAssistServlet` interface allows unauthenticated attackers to upload crafted files via path traversal, which can be executed on the web server, leading to remote code execution.
2322

2423
* WordPress:Plugin:InfiniteWP Client (CVE-2020-8772): A vulnerability in the InfiniteWP Client plugin allows attackers to perform restricted actions and gain administrative control of connected WordPress sites.
2524

26-
2725
**Impact**
2826

29-
These vulnerabilities could allow attackers to gain unauthorized access, execute malicious code, or take full control of affected systems. The Next.js, SSRF flaw may expose internal services or cloud metadata endpoints to attackers. Exploitations of ScriptCase & Sar2HTML could result in remote code execution, administrative takeover, and full server compromise. In Zhiyuan OA, the arbitrary file upload vulnerability allows attackers to execute malicious code on the web server, potentially exposing sensitive data and applications. The authentication bypass in WordPress InfiniteWP Client enables attackers to gain administrative access, risking data exposure and unauthorized control of connected sites.
27+
These vulnerabilities could allow attackers to gain unauthorized access, execute malicious code, or take full control of affected systems. The Next.js SSRF flaw may expose internal services or cloud metadata endpoints to attackers. Exploitations of ScriptCase and Sar2HTML could result in remote code execution, administrative takeover, and full server compromise. In Zhiyuan OA, the arbitrary file upload vulnerability allows attackers to execute malicious code on the web server, potentially exposing sensitive data and applications. The authentication bypass in WordPress InfiniteWP Client enables attackers to gain administrative access, risking data exposure and unauthorized control of connected sites.
3028

3129
Administrators are strongly advised to apply vendor patches immediately, remove unsupported software, and review authentication and access controls to mitigate these risks.
3230

33-
3431
<table style="width: 100%">
3532
<thead>
3633
<tr>
@@ -52,7 +49,7 @@ Administrators are strongly advised to apply vendor patches immediately, remove
5249
<td>100007D</td>
5350
<td>Command Injection - Common Attack Commands Args</td>
5451
<td>Log</td>
55-
<td>Blocked</td>
52+
<td>Block</td>
5653
<td>This rule has been merged into the original rule "Command Injection - Common Attack Commands" (ID: <RuleID id="89557ce9b26e4d4dbf29e90c28345b9b" />) for New WAF customers only.</td>
5754
</tr>
5855
<tr>
@@ -63,7 +60,7 @@ Administrators are strongly advised to apply vendor patches immediately, remove
6360
<td>100617</td>
6461
<td>Next.js - SSRF - CVE:CVE-2025-57822</td>
6562
<td>Log</td>
66-
<td>Blocked</td>
63+
<td>Block</td>
6764
<td>This is a New Detection</td>
6865
</tr>
6966
<tr>
@@ -74,7 +71,7 @@ Administrators are strongly advised to apply vendor patches immediately, remove
7471
<td>100659_BETA</td>
7572
<td>Common Payloads for Server-Side Template Injection - Beta</td>
7673
<td>Log</td>
77-
<td>Blocked</td>
74+
<td>Block</td>
7875
<td>This rule is merged into the original rule "Common Payloads for Server-Side Template Injection" (ID: <RuleID id="21c7a963e1b749e7b1753238a28a42c4" />)</td>
7976
</tr>
8077
<tr>

src/content/changelog/waf/scheduled-waf-release.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -43,8 +43,8 @@ import { RuleID } from "~/components";
4343
<td>This is a New Detection</td>
4444
</tr>
4545
<tr>
46-
<td>2025-09-01</td>
4746
<td>2025-09-08</td>
47+
<td>2025-09-15</td>
4848
<td>Log</td>
4949
<td>100880</td>
5050
<td>

0 commit comments

Comments
 (0)