This week’s highlights prioritise an emergency Oracle E-Business Suite RCE rule deployed to block active, high-impact exploitation. Also addressed are high-severity Chaos Mesh controller command-injection flaws that enable unauthenticated in-cluster RCE and potential cluster compromise, plus a form-data multipart boundary issue that permits HTTP Parameter Pollution (HPP). Two new generic SQLi detections were added to catch inline-comment obfuscation and information disclosure techniques.
Key Findings
- 
New emergency rule released for Oracle E-Business Suite (CVE-2025-61882) addressing an actively exploited remote code execution vulnerability in core business application modules. Immediate mitigation deployed to protect enterprise workloads. 
- 
Chaos Mesh (CVE-2025-59358,CVE-2025-59359,CVE-2025-59360,CVE-2025-59361): A GraphQL debug endpoint on the Chaos Controller Manager is exposed without authentication; several controller mutations ( cleanTcs,killProcesses,cleanIptables) are vulnerable to OS command injection.
- 
Form-Data (CVE-2025-7783): Attackers who can observe Math.random()outputs and control request fields in form-data may exploit this flaw to perform HTTP parameter pollution, leading to request tampering or data manipulation.
- 
Two new generic SQLi detections added to enhance baseline coverage against inline-comment obfuscation and information disclosure attempts. 
Impact
- 
CVE-2025-61882 — Oracle E-Business Suite remote code execution (emergency detection): attacker-controlled input can yield full system compromise, data exfiltration, and operational outage; immediate blocking enforced. 
- 
CVE-2025-59358 / CVE-2025-59359 / CVE-2025-59360 / CVE-2025-59361 — Unauthenticated command-injection in Chaos Mesh controllers allowing remote code execution, cluster compromise, and service disruption (high availability risk). 
- 
CVE-2025-7783 — Predictable multipart boundaries in form-data enabling HTTP Parameter Pollution; results include request tampering, parameter overwrite, and downstream data integrity loss. 
| Ruleset | Rule ID | Legacy Rule ID | Description | Previous Action | New Action | Comments | 
|---|---|---|---|---|---|---|
| Cloudflare Managed Ruleset | 0c9bf31ab6fa41fc8f12daaf8650f52f | 100882 | Chaos Mesh – Missing Authentication – CVE:CVE-2025-59358 | Log | Disabled | This is a New Detection | 
| Cloudflare Managed Ruleset | 5d459ed434ed446c9580c73c2b8c3680 | 100883 | Chaos Mesh – Command Injection – CVE:CVE-2025-59359 | Log | Block | This is a New Detection | 
| Cloudflare Managed Ruleset | a2591ba5befa4815a6861aefef859a04 | 100884 | Chaos Mesh – Command Injection – CVE:CVE-2025-59361 | Log | Block | This is a New Detection | 
| Cloudflare Managed Ruleset | 05eea4fabf6f4cf3aac1094b961f26a7 | 100886 | Form-Data – Parameter Pollution – CVE:CVE-2025-7783 | Log | Block | This is a New Detection | 
| Cloudflare Managed Ruleset | 90514c7810694b188f56979826a4074c | 100888 | Chaos Mesh – Command Injection – CVE:CVE-2025-59360 | Log | Block | This is a New Detection | 
| Cloudflare Managed Ruleset | 42fbc8c09ec84578b9633ffc31101b2f | 100916 | Oracle E-Business Suite – Remote Code Execution – CVE:CVE-2025-61882 | N/A | Block | This is a New Detection | 
| Cloudflare Managed Ruleset | badc687a3ba3420a844220b129aa43c3 | 100917 | Generic Rules – SQLi – Inline Comment Injection | N/A | Disabled | This is a New Detection | 
| Cloudflare Managed Ruleset | 28fa27511f29428899ceb5a273c10b6f | 100918 | Generic Rules – SQLi – Information Disclosure | N/A | Disabled | This is a New Detection | 
Source: Cloudflare
Latest Posts
- Updates available for Microsoft 365 Apps for Current Channel [MC1181780]![Updates available for Microsoft 365 Apps for Current Channel [MC1181780] 2 pexels apasaric 1411677](data:image/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==) 
- Microsoft Teams: File attachment control now enabled by default in external 1:1 and group chats [MC1181772]![Microsoft Teams: File attachment control now enabled by default in external 1:1 and group chats [MC1181772] 3 pexels scottwebb 593158](data:image/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==) 
- Microsoft Purview: eDiscovery admin content access restrictions when not in compliance with Entra policies [MC1181768]![Microsoft Purview: eDiscovery admin content access restrictions when not in compliance with Entra policies [MC1181768] 4 pexels ekaterina bolovtsova 4049991](data:image/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==) 
- Introducing the employee self-service agent in Microsoft 365 Copilot Studio [MC1181770]![Introducing the employee self-service agent in Microsoft 365 Copilot Studio [MC1181770] 5 pexels steve 26975400](data:image/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==) 

![Updates available for Microsoft 365 Apps for Current Channel [MC1181780] 2 pexels apasaric 1411677](https://mwpro.co.uk/wp-content/uploads/2025/06/pexels-apasaric-1411677-150x150.webp)
![Microsoft Teams: File attachment control now enabled by default in external 1:1 and group chats [MC1181772] 3 pexels scottwebb 593158](https://mwpro.co.uk/wp-content/uploads/2024/08/pexels-scottwebb-593158-150x150.webp)
![Microsoft Purview: eDiscovery admin content access restrictions when not in compliance with Entra policies [MC1181768] 4 pexels ekaterina bolovtsova 4049991](https://mwpro.co.uk/wp-content/uploads/2025/06/pexels-ekaterina-bolovtsova-4049991-150x150.webp)
![Introducing the employee self-service agent in Microsoft 365 Copilot Studio [MC1181770] 5 pexels steve 26975400](https://mwpro.co.uk/wp-content/uploads/2024/08/pexels-steve-26975400-150x150.webp)
![Access to Non-Native Viva Engage Network Ending October 13 2025 [MC1166851] 6 Access to Non-Native Viva Engage Network Ending October 13 2025 [MC1166851]](https://mwpro.co.uk/wp-content/uploads/2024/08/pexels-pachon-in-motion-426015731-18337638-150x150.webp) 
 ![Microsoft Teams: Emojis in section names [MC1166877] 7 Microsoft Teams: Emojis in section names [MC1166877]](https://mwpro.co.uk/wp-content/uploads/2024/08/pexels-googledeepmind-18069694-150x150.webp)