WAF – WAF Release – 2025-09-08

WAF – WAF Release – 2025-09-08

This week’s update

This week’s focus highlights newly disclosed vulnerabilities in web frameworks, enterprise applications, and widely deployed CMS plugins. The vulnerabilities include SSRF, authentication bypass, arbitrary file upload, and remote code execution (RCE), exposing organizations to high-impact risks such as unauthorized access, system compromise, and potential data exposure. In addition, security rule enhancements have been deployed to cover general command injection and server-side injection attacks, further strengthening protections.

Key Findings

  • Next.js (CVE-2025-57822): Improper handling of redirects in custom middleware can lead to server-side request forgery (SSRF) when user-supplied headers are forwarded. Attackers could exploit this to access internal services or cloud metadata endpoints. The issue has been resolved in versions 14.2.32 and 15.4.7. Developers using custom middleware should upgrade and verify proper redirect handling in next() calls.

  • ScriptCase (CVE-2025-47227, CVE-2025-47228): In the Production Environment extension in Netmake ScriptCase through 9.12.006 (23), two vulnerabilities allow attackers to reset admin accounts and execute system commands, potentially leading to full compromise of affected deployments.

  • Sar2HTML (CVE-2025-34030): In Sar2HTML version 3.2.2 and earlier, insufficient input sanitization of the plot parameter allows remote, unauthenticated attackers to execute arbitrary system commands. Exploitation could compromise the underlying server and its data.

  • Zhiyuan OA (CVE-2025-34040): An arbitrary file upload vulnerability exists in the Zhiyuan OA platform. Improper validation in the wpsAssistServlet interface allows unauthenticated attackers to upload crafted files via path traversal, which can be executed on the web server, leading to remote code execution.

  • WordPress:Plugin:InfiniteWP Client (CVE-2020-8772): A vulnerability in the InfiniteWP Client plugin allows attackers to perform restricted actions and gain administrative control of connected WordPress sites.

Impact

These vulnerabilities could allow attackers to gain unauthorized access, execute malicious code, or take full control of affected systems. The Next.js SSRF flaw may expose internal services or cloud metadata endpoints to attackers. Exploitations of ScriptCase and Sar2HTML could result in remote code execution, administrative takeover, and full server compromise. In Zhiyuan OA, the arbitrary file upload vulnerability allows attackers to execute malicious code on the web server, potentially exposing sensitive data and applications. The authentication bypass in WordPress InfiniteWP Client enables attackers to gain administrative access, risking data exposure and unauthorized control of connected sites.

Administrators are strongly advised to apply vendor patches immediately, remove unsupported software, and review authentication and access controls to mitigate these risks.

RulesetRule IDLegacy Rule IDDescriptionPrevious ActionNew ActionComments
Cloudflare Managed Ruleset7c5812a31fd94996b3299f7e963d7afc 100007DCommand Injection – Common Attack Commands ArgsLogBlockThis rule has been merged into the original rule “Command Injection – Common Attack Commands” (ID: 89557ce9b26e4d4dbf29e90c28345b9b ) for New WAF customers only.
Cloudflare Managed Rulesetcd528243d6824f7ab56182988230a75b 100617Next.js – SSRF – CVE:CVE-2025-57822LogBlockThis is a New Detection
Cloudflare Managed Ruleset503b337dac5c409d8f833a6ba22dabf1 100659_BETACommon Payloads for Server-Side Template Injection – BetaLogBlockThis rule is merged into the original rule “Common Payloads for Server-Side Template Injection” (ID: 21c7a963e1b749e7b1753238a28a42c4 )
Cloudflare Managed Ruleset6d24266148f24f5e9fa487f8b416b7ca 100824BCrushFTP – Remote Code Execution – CVE:CVE-2025-54309 – 3LogDisabledThis is a New Detection
Cloudflare Managed Ruleset154b217c43d04f11a13aeff05db1fa6b 100848ScriptCase – Auth Bypass – CVE:CVE-2025-47227LogDisabledThis is a New Detection
Cloudflare Managed Rulesetcad6f1c8c6d44ef59929e6532c62d330 100849ScriptCase – Command Injection – CVE:CVE-2025-47228LogDisabledThis is a New Detection
Cloudflare Managed Rulesete7464139fd3e44938b56716bef971afd 100872WordPress:Plugin:InfiniteWP Client – Missing Authorization – CVE:CVE-2020-8772LogBlockThis is a New Detection
Cloudflare Managed Ruleset0181ebb2cc234f2d863412e1bab19b0b 100873Sar2HTML – Command Injection – CVE:CVE-2025-34030LogBlockThis is a New Detection
Cloudflare Managed Ruleset34d5c7c7b08b40eaad5b2bb3f24c0fbe 100875Zhiyuan OA – Remote Code Execution – CVE:CVE-2025-34040LogBlockThis is a New Detection

Source: Cloudflare



Latest Posts

Pass It On
Leave a Comment

Comments

No comments yet. Why don’t you start the discussion?

Leave a Reply

Your email address will not be published. Required fields are marked *