This week’s release introduces new detections for remote code execution attempts targeting Monsta FTP (CVE-2025-34299), alongside improvements to an existing XSS detection to enhance coverage.
Key Findings
- CVE-2025-34299 is a critical remote code execution flaw in Monsta FTP, arising from improper handling of user-supplied parameters within the file-handling interface. Certain builds allow crafted requests to bypass sanitization and reach backend PHP functions that execute arbitrary commands. Attackers can send manipulated parameters through the web panel to trigger command execution within the application’s runtime environment.
Impact
If exploited, the vulnerability enables full remote command execution on the underlying server, allowing takeover of the hosting environment, unauthorized file access, and potential lateral movement. As the flaw can be triggered without authentication on exposed Monsta FTP instances, it represents a severe risk for publicly reachable deployments.
| Ruleset | Rule ID | Legacy Rule ID | Description | Previous Action | New Action | Comments |
|---|---|---|---|---|---|---|
| Cloudflare Managed Ruleset | 480da5e7984542a6b8d8d88da4fcc8a8 | N/A | Monsta FTP – Remote Code Execution – CVE:CVE-2025-34299 | Log | Block | This is a new detection |
| Cloudflare Managed Ruleset | 2380b125c53d42ac94479c42b7492846 | N/A | XSS – JS Context Escape – Beta | Log | Block | This rule is merged into the original rule “XSS – JS Context Escape” (ID: c1ad1bc37caa4cbeb104f44f7a3769d3 ) |
Source: Cloudflare
Latest Posts
- Amazon Bedrock AgentCore is now available in the South America (São Paulo) Region

- FreeRTOS 202604 LTS now available with enhanced security and MQTT v5.0

- Agent Registry API transition to Agent 365 [MC1297981]
![Agent Registry API transition to Agent 365 [MC1297981] 4 pexels steve 12891176](data:image/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==)
- Use sensitivity labels to block all connected experiences that analyze content in Word, Excel, and PowerPoint [MC1297982]
![Use sensitivity labels to block all connected experiences that analyze content in Word, Excel, and PowerPoint [MC1297982] 5 pexels medhat ayad 122846 383838](data:image/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==)



![Agent Registry API transition to Agent 365 [MC1297981] 4 pexels steve 12891176](https://mwpro.co.uk/wp-content/uploads/2025/06/pexels-steve-12891176-150x150.webp)
![Use sensitivity labels to block all connected experiences that analyze content in Word, Excel, and PowerPoint [MC1297982] 5 pexels medhat ayad 122846 383838](https://mwpro.co.uk/wp-content/uploads/2025/06/pexels-medhat-ayad-122846-383838-150x150.webp)
