Skip to content

Commit 5c1db82

Browse files
authored
Release-Sep-29-2025 (cloudflare#25503)
1 parent 7108283 commit 5c1db82

File tree

2 files changed

+127
-25
lines changed

2 files changed

+127
-25
lines changed
Lines changed: 91 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,91 @@
1+
---
2+
title: "WAF Release - 2025-09-29"
3+
description: Cloudflare WAF managed rulesets 2025-09-29 release
4+
date: 2025-09-29
5+
---
6+
7+
import { RuleID } from "~/components";
8+
9+
This week highlights four important vendor- and component-specific issues: an authentication bypass in SimpleHelp (CVE-2024-57727), an information-disclosure flaw in Flowise Cloud (CVE-2025-58434), an SSRF in the WordPress plugin Ditty (CVE-2025-8085), and a directory-traversal bug in Vite (CVE-2025-30208). These are paired with improvements to our generic detection coverage (SQLi, SSRF) to raise the baseline and reduce noisy gaps.
10+
11+
**Key Findings**
12+
13+
* SimpleHelp (CVE-2024-57727): Authentication bypass in SimpleHelp that can allow unauthorized access to management interfaces or sessions.
14+
15+
* Flowise Cloud (CVE-2025-58434): Information-disclosure vulnerability in Flowise Cloud that may expose sensitive configuration or user data to unauthenticated or low-privileged actors.
16+
17+
* WordPress:Plugin: Ditty (CVE-2025-8085): SSRF in the Ditty WordPress plugin enabling server-side requests that could reach internal services or cloud metadata endpoints.
18+
19+
* Vite (CVE-2025-30208): Directory-traversal vulnerability in Vite allowing access to filesystem paths outside the intended web root.
20+
21+
**Impact**
22+
23+
These vulnerabilities allow attackers to gain access, escalate privileges, or execute actions that were previously unavailable:
24+
25+
* SimpleHelp (CVE-2024-57727): An authentication bypass that can let unauthenticated attackers access management interfaces or hijack sessions — enabling lateral movement, credential theft, or privilege escalation within affected environments.
26+
27+
* Flowise Cloud (CVE-2025-58434): Information-disclosure flaw that can expose sensitive configuration, tokens, or user data; leaked secrets may be chained into account takeover or privileged access to backend services.
28+
29+
* WordPress:Plugin: Ditty (CVE-2025-8085): SSRF that enables server-side requests to internal services or cloud metadata endpoints, potentially allowing attackers to retrieve credentials or reach otherwise inaccessible infrastructure, leading to privilege escalation or cloud resource compromise.
30+
31+
* Vite (CVE-2025-30208): Directory-traversal vulnerability that can expose filesystem contents outside the web root (configuration files, keys, source code), which attackers can use to escalate privileges or further compromise systems.
32+
33+
<table style="width: 100%">
34+
<thead>
35+
<tr>
36+
<th>Ruleset</th>
37+
<th>Rule ID</th>
38+
<th>Legacy Rule ID</th>
39+
<th>Description</th>
40+
<th>Previous Action</th>
41+
<th>New Action</th>
42+
<th>Comments</th>
43+
</tr>
44+
</thead>
45+
<tbody>
46+
<tr>
47+
<td>Cloudflare Managed Ruleset</td>
48+
<td>
49+
<RuleID id="6fe90532af50427484a5275c8c2e30fb" />
50+
</td>
51+
<td>100717</td>
52+
<td>SimpleHelp - Auth Bypass - CVE:CVE-2024-57727</td>
53+
<td>Log</td>
54+
<td>Block</td>
55+
<td>This rule is merged to 100717 in legacy WAF and <RuleID id="498fcd81a62a4b5ca943e2de958094d3" /> in new WAF</td>
56+
</tr>
57+
<tr>
58+
<td>Cloudflare Managed Ruleset</td>
59+
<td>
60+
<RuleID id="013ef5de3f074fd5a43cdd70d58b886b" />
61+
</td>
62+
<td>100775</td>
63+
<td>Flowise Cloud - Information Disclosure - CVE:CVE-2025-58434</td>
64+
<td>Log</td>
65+
<td>Block</td>
66+
<td>This is a New Detection</td>
67+
</tr>
68+
<tr>
69+
<td>Cloudflare Managed Ruleset</td>
70+
<td>
71+
<RuleID id="68fc5c086ccb4b40a35a63b19bce1ff4" />
72+
</td>
73+
<td>100881</td>
74+
<td>WordPress:Plugin:Ditty - SSRF - CVE:CVE-2025-8085</td>
75+
<td>Log</td>
76+
<td>Block</td>
77+
<td>This is a New Detection</td>
78+
</tr>
79+
<tr>
80+
<td>Cloudflare Managed Ruleset</td>
81+
<td>
82+
<RuleID id="9e1a56e6b3bc49b187bf6e35ddc329dd" />
83+
</td>
84+
<td>100887</td>
85+
<td>Vite - Directory Traversal - CVE:CVE-2025-30208</td>
86+
<td>Log</td>
87+
<td>Block</td>
88+
<td>This is a New Detection</td>
89+
</tr>
90+
</tbody>
91+
</table>
Lines changed: 36 additions & 25 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
2-
title: WAF Release - Scheduled changes for 2025-09-29
3-
description: WAF managed ruleset changes scheduled for 2025-09-29
4-
date: 2025-09-22
2+
title: WAF Release - Scheduled changes for 2025-10-06
3+
description: WAF managed ruleset changes scheduled for 2025-10-06
4+
date: 2025-09-29
55
scheduled: true
66
---
77

@@ -21,48 +21,59 @@ import { RuleID } from "~/components";
2121
</thead>
2222
<tbody>
2323
<tr>
24-
<td>2025-09-22</td>
2524
<td>2025-09-29</td>
25+
<td>2025-10-06</td>
2626
<td>Log</td>
27-
<td>100717</td>
27+
<td>100882</td>
2828
<td>
29-
<RuleID id="6fe90532af50427484a5275c8c2e30fb" />
29+
<RuleID id="0c9bf31ab6fa41fc8f12daaf8650f52f" />
3030
</td>
31-
<td>SimpleHelp - Auth Bypass - CVE:CVE-2024-57727 - Beta</td>
32-
<td>This rule will be merged to <RuleID id="498fcd81a62a4b5ca943e2de958094d3" /></td>
31+
<td>Chaos Mesh - Missing Authentication - CVE:CVE-2025-59358</td>
32+
<td>This is a New Detection</td>
3333
</tr>
34-
<tr>
35-
<td>2025-09-22</td>
34+
<tr>
3635
<td>2025-09-29</td>
36+
<td>2025-10-06</td>
3737
<td>Log</td>
38-
<td>100775</td>
38+
<td>100883</td>
3939
<td>
40-
<RuleID id="013ef5de3f074fd5a43cdd70d58b886b" />
40+
<RuleID id="5d459ed434ed446c9580c73c2b8c3680" />
4141
</td>
42-
<td>Flowise Cloud - Information Disclosure - CVE:CVE-2025-58434</td>
42+
<td>Chaos Mesh - Command Injection - CVE:CVE-2025-59359</td>
4343
<td>This is a New Detection</td>
44-
</tr>
44+
</tr>
4545
<tr>
46-
<td>2025-09-22</td>
4746
<td>2025-09-29</td>
47+
<td>2025-10-06</td>
4848
<td>Log</td>
49-
<td>100881</td>
49+
<td>100884</td>
5050
<td>
51-
<RuleID id="68fc5c086ccb4b40a35a63b19bce1ff4" />
51+
<RuleID id="a2591ba5befa4815a6861aefef859a04" />
5252
</td>
53-
<td>WordPress:Plugin:Ditty - SSRF - CVE:CVE-2025-8085</td>
53+
<td>Chaos Mesh - Command Injection - CVE:CVE-2025-59361</td>
5454
<td>This is a New Detection</td>
55-
</tr>
56-
<tr>
57-
<td>2025-09-22</td>
55+
</tr>
56+
<tr>
5857
<td>2025-09-29</td>
58+
<td>2025-10-06</td>
5959
<td>Log</td>
60-
<td>100887</td>
60+
<td>100886</td>
6161
<td>
62-
<RuleID id="9e1a56e6b3bc49b187bf6e35ddc329dd" />
62+
<RuleID id="05eea4fabf6f4cf3aac1094b961f26a7" />
6363
</td>
64-
<td>Vite - Directory Traversal - CVE:CVE-2025-30208</td>
64+
<td>Form-Data - Parameter Pollution - CVE:CVE-2025-7783</td>
6565
<td>This is a New Detection</td>
66-
</tr>
66+
</tr>
67+
<tr>
68+
<td>2025-09-29</td>
69+
<td>2025-10-06</td>
70+
<td>Log</td>
71+
<td>100888</td>
72+
<td>
73+
<RuleID id="90514c7810694b188f56979826a4074c" />
74+
</td>
75+
<td>Chaos Mesh - Command Injection - CVE:CVE-2025-59360</td>
76+
<td>This is a New Detection</td>
77+
</tr>
6778
</tbody>
6879
</table>

0 commit comments

Comments
 (0)