Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Cloudflare Fixes ACME Validation Bug Allowing WAF Bypass to Origin Servers

Posted on January 20, 2026January 20, 2026 By CWS

Ravie LakshmananJan 20, 2026Web Safety / Vulnerability
Cloudflare has addressed a safety vulnerability impacting its Computerized Certificates Administration Surroundings (ACME) validation logic that made it potential to bypass safety controls and entry origin servers.
“The vulnerability was rooted in how our edge community processed requests destined for the ACME HTTP-01 problem path (/.well-known/acme-challenge/*),” the net infrastructure firm’s Hrushikesh Deshpande, Andrew Mitchell, and Leland Garofalo stated.
The net infrastructure firm stated it discovered no proof that the vulnerability was ever exploited in a malicious context.
ACME is a communications protocol (RFC 8555) that facilitates automated issuance, renewal, and revocation of SSL/TLS certificates. Each certificates provisioned to a web site by a certificates authority (CA) is validated utilizing challenges to show area possession.

This course of is often achieved utilizing an ACME shopper like Certbot that proves area possession by way of an HTTP-01 (or DNS-01) problem and manages the certificates lifecycle. The HTTP-01 problem checks for a validation token and a key fingerprint situated within the internet server at ” over HTTP port 80.
The CA’s server makes an HTTP GET request to that actual URL to retrieve the file. As soon as the verification succeeds, the certificates is issued and the CA marks the ACME account (i.e., the registered entity on its server) as licensed to handle that particular area.
Within the occasion the problem is utilized by a certificates order managed by Cloudflare, then Cloudflare will reply on the aforementioned path and supply the token offered by the CA to the caller. But when it doesn’t correlate to a Cloudflare-managed order, the request is routed to the shopper origin, which can be utilizing a distinct system for area validation.

The vulnerability, found and reported by FearsOff in October 2025, has to do with a flawed implementation of the ACME validation course of that causes sure problem requests to the URL to disable internet utility firewall (WAF) guidelines and permit it to achieve the origin server when it ought to have been ideally blocked.

In different phrases, the logic didn’t confirm whether or not the token within the request really matched an lively problem for that particular hostname, successfully allowing an attacker to ship arbitrary requests to the ACME path and circumvent WAF protections totally, granting them the flexibility to achieve the origin server.
“Beforehand, when Cloudflare was serving an HTTP-01 problem token, if the trail requested by the caller matched a token for an lively problem in our system, the logic serving an ACME problem token would disable WAF options, since Cloudflare can be straight serving the response,” the corporate defined.

“That is executed as a result of these options can intrude with the CA’s potential to validate the token values and would trigger failures with automated certificates orders and renewals. Nonetheless, within the situation that the token used was related to a distinct zone and never straight managed by Cloudflare, the request can be allowed to proceed onto the shopper origin with out additional processing by WAF rulesets.”
Kirill Firsov, founder and CEO of FearsOff, stated the vulnerability might be exploited by a malicious person to acquire a deterministic, lengthy‑lived token and entry delicate recordsdata on the origin server throughout all Cloudflare hosts, opening the door to reconnaissance.
The vulnerability was addressed by Cloudflare on October 27, 2025, with a code change that serves the response and disables WAF options solely when the request matches a sound ACME HTTP-01 problem token for that hostname.

The Hacker News Tags:ACME, Allowing, Bug, Bypass, Cloudflare, Fixes, Origin, Servers, Validation, WAF

Post navigation

Previous Post: Weaponized Invite Enabled Calendar Data Theft via Google Gemini
Next Post: Evelyn Stealer Malware Abuses VS Code Extensions to Steal Developer Credentials and Crypto

Related Posts

New Sturnus Android Trojan Quietly Captures Encrypted Chats and Hijacks Devices The Hacker News
Malicious VSX Extension “SleepyDuck” Uses Ethereum to Keep Its Command Server Alive The Hacker News
New Android Banking Trojan “Klopatra” Uses Hidden VNC to Control Infected Smartphones The Hacker News
New UEFI Flaw Enables Early-Boot DMA Attacks on ASRock, ASUS, GIGABYTE, MSI Motherboards The Hacker News
CERT-UA Warns of HTA-Delivered C# Malware Attacks Using Court Summons Lures The Hacker News
Nation-State Hacks, Spyware Alerts, Deepfake Malware, Supply Chain Backdoors The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • EU Plans Phase Out of High Risk Telecom Suppliers, in Proposals Seen as Targeting China
  • North Korea-Linked Hackers Target Developers via Malicious VS Code Projects
  • Sprocket Security Appoints Eric Sheridan as Chief Technology Officer
  • One Identity Upgrades Identity Manager for Stronger Security
  • Gootloader with Low Detection Rate Bypasses Most Security Tools

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • EU Plans Phase Out of High Risk Telecom Suppliers, in Proposals Seen as Targeting China
  • North Korea-Linked Hackers Target Developers via Malicious VS Code Projects
  • Sprocket Security Appoints Eric Sheridan as Chief Technology Officer
  • One Identity Upgrades Identity Manager for Stronger Security
  • Gootloader with Low Detection Rate Bypasses Most Security Tools

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark