Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
13 changes: 1 addition & 12 deletions src/content/changelog/waf/2025-07-14-waf-release.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -12,7 +12,7 @@ This week’s vulnerability analysis highlights emerging web application threats

- XSS – Attribute Overloading: A novel cross-site scripting technique where attackers abuse custom or non-standard HTML attributes to smuggle payloads into the DOM. These payloads evade traditional sanitization logic, especially in frameworks that loosely validate attributes or trust unknown tokens.
- XSS – onToggle Event Abuse: Exploits the lesser-used onToggle event (triggered by elements like `<details>`) to execute arbitrary JavaScript when users interact with UI elements. This vector is often overlooked by static analyzers and can be embedded in seemingly benign components.
- SQLi – Obfuscated Boolean Logic: An advanced SQL injection variant that uses non-standard Boolean expressions, comment-based obfuscation, or alternate encodings (for example, `/*!true*/`, `AND/**/1=1`) to bypass basic input validation and WAF signatures. This technique is particularly dangerous in dynamic query construction contexts.


**Impact**

Expand Down Expand Up @@ -53,16 +53,5 @@ These vulnerabilities target both user-facing components and back-end databases,
<td>Block</td>
<td>This is a New Detection</td>
</tr>
<tr>
<td>Cloudflare Managed Ruleset</td>
<td>
<RuleID id="7663ea44178441a0b3205c145563445f" />
</td>
<td>100800</td>
<td>SQLi - Obfuscated Boolean</td>
<td>Log</td>
<td>Block</td>
<td>This is a New Detection</td>
</tr>
</tbody>
</table>
11 changes: 0 additions & 11 deletions src/content/changelog/waf/2025-07-28-waf-release.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -89,16 +89,5 @@ These vulnerabilities target user-facing components, web application servers, an
<td>Block</td>
<td>This is a New Detection</td>
</tr>
<tr>
<td>Cloudflare Managed Ruleset</td>
<td>
<RuleID id="9b5c5e13d2ca4253a89769f2194f7b2d" />
</td>
<td>100822</td>
<td>WordPress:Plugin:WPBookit - Remote Code Execution - CVE:CVE-2025-6058</td>
<td>Log</td>
<td>Block</td>
<td>This is a New Detection</td>
</tr>
</tbody>
</table>
Loading