Categories: Cyber Security News

Cloudflare Zero-Day Flaw Allows Attackers to Bypass Security Protections

A critical zero-day vulnerability in Cloudflare’s Web Application Firewall (WAF) allowed attackers to bypass security controls and directly access protected origin servers.

Security researchers from FearsOff discovered on October 9, 2025, that requests targeting a specific certificate-validation path could completely circumvent customer-configured WAF rules designed to block unauthorized traffic.

The Hidden Backdoor in Certificate Validation

The vulnerability exploited a path used by the Automatic Certificate Management Environment (ACME) protocol.

ACME automates SSL/TLS certificate issuance by having certificate authorities verify domain ownership through a specific URL pattern: /.well-known/acme-challenge/{token}.

This path is supposed to be a narrow, controlled gateway used only for certificate validation robots to verify domain ownership.

Cloudflare’s edge network contained a logic flaw in how it processed requests to this ACME challenge path.

When any request targeted /.well-known/acme-challenge/*, the system would turn off WAF security features to prevent interference with legitimate certificate validation.

However, the code failed to verify whether the token in the request actually matched an active challenge for that specific hostname.

Block page(Source: fearsoff)

This meant attackers could send arbitrary requests to the ACME path and bypass WAF protections entirely, reaching the origin server directly.

FearsOff researchers created demonstration environments to prove the severity of this bypass. They configured WAF rules to block all traffic to test domains, including cf-php.fearsoff.org, cf-spring.fearsoff.org, and cf-nextjs.fearsoff.org.

Routine requests to these domains correctly returned Cloudflare block pages. However, identical requests targeting the ACME challenge path received responses directly from origin servers, bypassing all security controls.

The addition flow and the resulting Pending Validation state.(Source: fearsoff)

The impact extended beyond simple access. On Spring Boot applications, researchers used servlet path traversal techniques (e.g., ..;/) to access sensitive actuator endpoints, such as /actuator/env, which exposed environment variables, database credentials, and API tokens.

On Next.js applications, server-side rendering logic exposes operational details never intended for public access.

PHP applications with local file inclusion vulnerabilities became exploitable, allowing attackers to read system files like /etc/hosts.

Researchers also confirmed that account-level WAF rules were completely ignored. They configured rules to block requests containing a specific test header (X-middleware-subrequest).

At typical paths, these rules correctly blocked flagged requests. The identical request targeting the ACME challenge path was allowed through without evaluation.

This meant entire classes of header-based attacks, including SQL injection via header concatenation, server-side request forgery via X-Forwarded-Host, cache poisoning, and HTTP method override tricks, could reach vulnerable origins.

Cloudflare deployed a permanent fix on October 27, 2025, modifying the ACME challenge logic to disable WAF features only when the request token matches a valid, active challenge for that hostname.

The vulnerability timeline shows responsible disclosure: the report was submitted via HackerOne on October 9; vendor validation began on October 13; HackerOne triaged it on October 14; and the final fix was deployed on October 27.

Cloudflare confirmed that no customer action is required and stated they found no evidence of malicious exploitation.

The collaboration involved the Crypto.com Security Team for independent verification and direct engagement with Cloudflare CEO Matthew Prince to expedite the patch.

The bug highlights how maintenance paths intended for automation can become dangerous attack vectors when security controls apply inconsistently across different code paths.

Follow us on Google News , LinkedIn and X to Get More Instant UpdatesSet Cyberpress as a Preferred Source in Google.

The post Cloudflare Zero-Day Flaw Allows Attackers to Bypass Security Protections appeared first on Cyber Security News.

rssfeeds-admin

Recent Posts

Hackers Abuse Fake Wallpaper App and YouTube Channel to Spread notnullOSX Malware

A new macOS malware called notnullOSX has surfaced in early 2026, specifically built to steal…

28 minutes ago

Hackers Abuse Fake Wallpaper App and YouTube Channel to Spread notnullOSX Malware

A new macOS malware called notnullOSX has surfaced in early 2026, specifically built to steal…

28 minutes ago

Fake TradingView AI Agent Site is Delivering Needle Stealer Malware via Fake TradingClaw

A new malware campaign is tricking traders into downloading a data-stealing tool by impersonating the…

28 minutes ago

Fake TradingView AI Agent Site is Delivering Needle Stealer Malware via Fake TradingClaw

A new malware campaign is tricking traders into downloading a data-stealing tool by impersonating the…

29 minutes ago

Hackers Use Outlook Mailboxes to Hide Linux GoGra Backdoor Communications

A nation-state-linked hacking group has found a clever way to hide its malicious activity inside…

29 minutes ago

Township Supervisors Across Pennsylvania Urge Colleagues to Adopt Zoning for Data Centers

Upper Merion Township in the Philadelphia suburbs is no stranger to development.  During the holiday…

33 minutes ago

This website uses cookies.