Skip to content

Commit e3c1421

Browse files
authored
Release-Aug-07-2025- Emergency (#24251)
* Release-Aug-07-2025- Emergency * Release-Aug-07-2025- Emergency
1 parent 703dd18 commit e3c1421

File tree

1 file changed

+61
-0
lines changed

1 file changed

+61
-0
lines changed
Lines changed: 61 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,61 @@
1+
---
2+
title: "WAF Release - 2025-08-07 - Emergency"
3+
description: Cloudflare WAF managed rulesets 2025-08-07 emergency release
4+
date: 2025-08-07
5+
---
6+
7+
import { RuleID } from "~/components";
8+
9+
This week’s highlight focuses on two critical vulnerabilities affecting key infrastructure and enterprise content management platforms. Both flaws present significant remote code execution risks that can be exploited with minimal or no user interaction.
10+
11+
**Key Findings**
12+
13+
- Squid (≤6.3) — CVE-2025-54574: A heap buffer overflow occurs when processing Uniform Resource Names (URNs). This vulnerability may allow remote attackers to execute arbitrary code on the server. The issue has been resolved in version 6.4.
14+
15+
- Adobe AEM (≤6.5.23) — CVE-2025-54253: Due to a misconfiguration, attackers can achieve remote code execution without requiring any user interaction, posing a severe threat to affected deployments.
16+
17+
**Impact**
18+
19+
Both vulnerabilities expose critical attack vectors that can lead to full server compromise. The Squid heap buffer overflow allows remote code execution by crafting malicious URNs, which can lead to server takeover or denial of service. Given Squid’s widespread use as a caching proxy, this flaw could be exploited to disrupt network traffic or gain footholds inside secure environments.
20+
21+
Adobe AEM’s remote code execution vulnerability enables attackers to run arbitrary code on the content management server without any user involvement. This puts sensitive content, application integrity, and the underlying infrastructure at extreme risk. Exploitation could lead to data theft, defacement, or persistent backdoor installation.
22+
23+
These findings reinforce the urgency of updating to the patched versions — Squid 6.4 and Adobe AEM 6.5.24 or later — and reviewing configurations to prevent exploitation.
24+
25+
<table style="width: 100%">
26+
<thead>
27+
<tr>
28+
<th>Ruleset</th>
29+
<th>Rule ID</th>
30+
<th>Legacy Rule ID</th>
31+
<th>Description</th>
32+
<th>Previous Action</th>
33+
<th>New Action</th>
34+
<th>Comments</th>
35+
</tr>
36+
</thead>
37+
<tbody>
38+
<tr>
39+
<td>Cloudflare Managed Ruleset</td>
40+
<td>
41+
<RuleID id="f61ed7c1e7e24c3380289e41ef7e015b" />
42+
</td>
43+
<td>100844</td>
44+
<td>Adobe Experience Manager Forms - Remote Code Execution - CVE:CVE-2025-54253</td>
45+
<td>N/A</td>
46+
<td>Block</td>
47+
<td>This is a New Detection</td>
48+
</tr>
49+
<tr>
50+
<td>Cloudflare Managed Ruleset</td>
51+
<td>
52+
<RuleID id="e76e65f5a3aa43f49e0684a6baec057a" />
53+
</td>
54+
<td>100840</td>
55+
<td>Squid - Buffer Overflow - CVE:CVE-2025-54574</td>
56+
<td>N/A</td>
57+
<td>Block</td>
58+
<td>This is a New Detection</td>
59+
</tr>
60+
</tbody>
61+
</table>

0 commit comments

Comments
 (0)