diff --git a/src/content/changelog/waf/2025-10-13-waf-release.mdx b/src/content/changelog/waf/2025-10-13-waf-release.mdx new file mode 100644 index 000000000000000..74ecdf72e024a97 --- /dev/null +++ b/src/content/changelog/waf/2025-10-13-waf-release.mdx @@ -0,0 +1,44 @@ +--- +title: "WAF Release - 2025-10-13" +description: Cloudflare WAF managed rulesets 2025-10-13 release +date: 2025-10-13 +--- + +import { RuleID } from "~/components"; + +This week’s highlights include a new JinJava rule targeting a sandbox-bypass flaw that could allow malicious template input to escape execution controls. The rule improves detection for unsafe template rendering paths. + +**Key Findings** + +New WAF rule deployed for JinJava (CVE-2025-59340) to block a sandbox bypass in the template engine that permits attacker-controlled type construction and arbitrary class instantiation; in vulnerable environments this can escalate to remote code execution and full server compromise. + +**Impact** + +- CVE-2025-59340 — Exploitation enables attacker-supplied type descriptors / Jackson `ObjectMapper` abuse, allowing arbitrary class loading, file/URL access (LFI/SSRF primitives) and, with suitable gadget chains, potential remote code execution and system compromise. + + + + + + + + + + + + + + + + + + + + + + + + +
RulesetRule IDLegacy Rule IDDescriptionPrevious ActionNew ActionComments
Cloudflare Managed Ruleset + + 100892JinJava - SSTI - CVE:CVE-2025-59340LogBlockThis is a New Detection
diff --git a/src/content/changelog/waf/scheduled-waf-release.mdx b/src/content/changelog/waf/scheduled-waf-release.mdx index cabed065fa361ee..cb5a25f26853678 100644 --- a/src/content/changelog/waf/scheduled-waf-release.mdx +++ b/src/content/changelog/waf/scheduled-waf-release.mdx @@ -1,7 +1,7 @@ --- -title: WAF Release - Scheduled changes for 2025-10-13 -description: WAF managed ruleset changes scheduled for 2025-10-13 -date: 2025-10-06 +title: WAF Release - Scheduled changes for 2025-10-20 +description: WAF managed ruleset changes scheduled for 2025-10-20 +date: 2025-10-13 scheduled: true --- @@ -21,15 +21,26 @@ import { RuleID } from "~/components"; - 2025-10-06 2025-10-13 + 2025-10-20 Log - 100892 + 100598A - + - JinJava - SSTI - CVE:CVE-2025-59340 - This is a New Detection + Remote Code Execution - Common Bash Bypass - Beta + This rule is merged into the original rule "Remote Code Execution - Common Bash Bypass" (ID: ) + + 2025-10-13 + 2025-10-20 + Log + 100916A + + + + Oracle E-Business Suite - Remote Code Execution - CVE:CVE-2025-61882 - 2 + This is a New Detection + \ No newline at end of file