This week’s highlights include a new JinJava rule targeting a sandbox-bypass flaw that could allow malicious template input to escape execution controls. The rule improves detection for unsafe template rendering paths.
Key Findings
New WAF rule deployed for JinJava (CVE-2025-59340) to block a sandbox bypass in the template engine that permits attacker-controlled type construction and arbitrary class instantiation; in vulnerable environments this can escalate to remote code execution and full server compromise.
Impact
- CVE-2025-59340 — Exploitation enables attacker-supplied type descriptors / Jackson
ObjectMapperabuse, allowing arbitrary class loading, file/URL access (LFI/SSRF primitives) and, with suitable gadget chains, potential remote code execution and system compromise.
| Ruleset | Rule ID | Legacy Rule ID | Description | Previous Action | New Action | Comments |
|---|---|---|---|---|---|---|
| Cloudflare Managed Ruleset | b327d6442e2d4848b4aab3cbc04bab5f | 100892 | JinJava – SSTI – CVE:CVE-2025-59340 | Log | Block | This is a New Detection |
Source: Cloudflare



![Open Word, Excel, and PowerPoint Files in Microsoft 365 Copilot Chat [MC1225199] 4 pexels ifreestock 405031](https://mwpro.co.uk/wp-content/uploads/2024/08/pexels-ifreestock-405031-150x150.webp)
![(Updated) Microsoft Teams: Network Device Interface (NDI) automatic binaries update for macOS [MC1192253] 5 pexels kerber 774731](https://mwpro.co.uk/wp-content/uploads/2025/06/pexels-kerber-774731-150x150.webp)
![Retiring the “Refresh all on page” button in OneNote Meeting Details pane by end of 2025 [MC1171847] 7 Retiring the “Refresh all on page” button in OneNote Meeting Details pane by end of 2025 [MC1171847]](https://mwpro.co.uk/wp-content/uploads/2024/08/pexels-skylar-kang-6046814-150x150.webp)