This week’s release introduces new detections for CVE-2025-68645 and CVE-2025-31125.
Key Findings
- CVE-2025-68645: A Local File Inclusion (LFI) vulnerability in the Webmail Classic UI of Zimbra Collaboration Suite (ZCS) 10.0 and 10.1 allows unauthenticated remote attackers to craft requests to the
/h/restendpoint, improperly influence internal dispatching, and include arbitrary files from the WebRoot directory. - CVE-2025-31125: Vite, the JavaScript frontend tooling framework, exposes content of non-allowed files via
?inline&importwhen its development server is network-exposed, enabling unauthorized attackers to read arbitrary files and potentially leak sensitive information.
| Ruleset | Rule ID | Legacy Rule ID | Description | Previous Action | New Action | Comments |
|---|---|---|---|---|---|---|
| Cloudflare Managed Ruleset | 695d76ff756844d384cab548833761f7 | N/A | Zimbra – Local File Inclusion – CVE:CVE-2025-68645 | Log | Block | This is a new detection. |
| Cloudflare Managed Ruleset | 38fff9f3deba46a2abc10a8f950ed8c8 | N/A | Vite – WASM Import Path Traversal – CVE:CVE-2025-31125 | Log | Block | This is a new detection. |
Source: Cloudflare
Latest Posts
- Dynamics 365 Customer Service- Estimate AI credits for agents from forecasted demand [MC1307183]
![Dynamics 365 Customer Service- Estimate AI credits for agents from forecasted demand [MC1307183] 2 pexels cottonbro 5054213](data:image/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==)
- Microsoft Power Automate – Automate administrator-level desktop applications in unattended runs [MC1307177]
![Microsoft Power Automate - Automate administrator-level desktop applications in unattended runs [MC1307177] 3 pexels pixabay 267961](data:image/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==)
- Microsoft Dataverse – Create Dataverse agent users with Microsoft Entra agent identity [MC1307182]
![Microsoft Dataverse - Create Dataverse agent users with Microsoft Entra agent identity [MC1307182] 4 pexels anniroenkae 15578416](data:image/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==)
- GCP Release Notes: May 08, 2026


![Dynamics 365 Customer Service- Estimate AI credits for agents from forecasted demand [MC1307183] 2 pexels cottonbro 5054213](https://mwpro.co.uk/wp-content/uploads/2025/06/pexels-cottonbro-5054213-150x150.webp)
![Microsoft Power Automate - Automate administrator-level desktop applications in unattended runs [MC1307177] 3 pexels pixabay 267961](https://mwpro.co.uk/wp-content/uploads/2024/08/pexels-pixabay-267961-150x150.webp)
![Microsoft Dataverse - Create Dataverse agent users with Microsoft Entra agent identity [MC1307182] 4 pexels anniroenkae 15578416](https://mwpro.co.uk/wp-content/uploads/2025/06/pexels-anniroenkae-15578416-150x150.webp)

