diff --git a/src/content/changelog/waf/2025-09-24-emergency-waf-release.mdx b/src/content/changelog/waf/2025-09-24-emergency-waf-release.mdx new file mode 100644 index 000000000000000..2a09bf015de4913 --- /dev/null +++ b/src/content/changelog/waf/2025-09-24-emergency-waf-release.mdx @@ -0,0 +1,44 @@ +--- +title: "WAF Release - 2025-09-24 - Emergency" +description: Cloudflare WAF managed rulesets 2025-09-24 emergency release +date: 2025-09-24 +--- + +import { RuleID } from "~/components"; + +This week highlights a critical vendor-specific vulnerability: a deserialization flaw in the License Servlet of Fortra’s GoAnywhere MFT. By forging a license response signature, an attacker can trigger deserialization of arbitrary objects, potentially leading to command injection. + +**Key Findings** + +* GoAnywhere MFT (CVE-2025-10035): Deserialization vulnerability in the License Servlet that allows attackers with a forged license response signature to deserialize arbitrary objects, potentially resulting in command injection. + +**Impact** + +GoAnywhere MFT (CVE-2025-10035): Exploitation enables attackers to escalate privileges or achieve remote code execution via command injection. + + + + + + + + + + + + + + + + + + + + + + + + +
RulesetRule IDLegacy Rule IDDescriptionPrevious ActionNew ActionComments
Cloudflare Managed Ruleset + + 100787Fortra GoAnywhere - Auth Bypass - CVE:CVE-2025-10035N/ABlockThis is a New Detection
\ No newline at end of file