Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Cloudflare Zero-Day Vulnerability Enables Any Host Access Bypassing Protections

Posted on January 19, 2026January 20, 2026 By CWS

A vital zero-day vulnerability in Cloudflare’s Internet Software Firewall (WAF) allowed attackers to bypass safety controls and instantly entry protected origin servers by means of a certificates validation path.

Safety researchers from FearsOff found that requests concentrating on the /.well-known/acme-challenge/ listing might attain origins even when customer-configured WAF guidelines explicitly blocked all different visitors.

The Automated Certificates Administration Setting (ACME) protocol automates SSL/TLS certificates validation by requiring Certificates Authorities (CAs) to confirm area possession.

Within the HTTP-01 validation methodology, CAs anticipate web sites to serve a one-time token at /.well-known/acme-challenge/{token}. This path exists on practically each fashionable web site as a silent upkeep route for automated certificates issuance.

The design intention limits this entry to a single validation bot checking one particular file, not as an open gateway to the origin server.

Cloudflare Zero-Day Vulnerability

FearsOff researchers detected the vulnerability whereas reviewing purposes the place WAF configurations blocked international entry and permitted solely particular sources.

Testing revealed that requests directed on the ACME problem path bypassed WAF guidelines completely, permitting the origin server to reply instantly as an alternative of returning Cloudflare’s block web page.

To substantiate this wasn’t a tenant-specific misconfiguration, researchers created managed demonstration hosts at cf-php.fearsoff.org, cf-spring.fearsoff.org, and cf-nextjs.fearsoff.org.

Regular requests to those hosts encountered block pages as anticipated, however ACME path requests returned origin-generated responses, sometimes framework 404 errors.

The vulnerability stemmed from Cloudflare’s edge community processing logic for ACME HTTP-01 problem paths. When Cloudflare served problem tokens for its personal managed certificates orders, the system disabled WAF options to forestall interference with CA validation.

Nonetheless, a vital flaw emerged: if the requested token didn’t match a Cloudflare-managed certificates order, the request bypassed WAF analysis completely and proceeded on to the client origin.

This logic error remodeled a slim certificates validation exception right into a broad safety bypass affecting all hosts behind Cloudflare safety.

The bypass allowed researchers to show a number of assault vectors in opposition to frequent net frameworks. On Spring/Tomcat purposes, servlet path traversal strategies utilizing ..;/ accessed delicate actuator endpoints that uncovered course of environments, database credentials, API tokens, and cloud keys.

Subsequent.js server-side rendering purposes leaked operational knowledge by means of direct origin responses that had been by no means meant for public web entry.

PHP purposes with native file inclusion vulnerabilities turned exploitable, permitting attackers to entry the file system by way of malicious path parameters. Past framework-specific assaults, account-level WAF guidelines configured to dam requests based mostly on customized headers had been utterly ignored for ACME path visitors.

FearsOff reported the vulnerability by means of Cloudflare’s HackerOne bug bounty program on October 9, 2025. Cloudflare initiated validation on October 13, 2025, and HackerOne triaged the problem on October 14, 2025.

The corporate deployed a everlasting repair on October 27, 2025, modifying the code to disable security measures solely when requests match legitimate ACME HTTP-01 problem tokens for the particular hostname.

Submit-fix testing confirmed WAF guidelines now apply uniformly throughout all paths, together with the beforehand susceptible ACME problem route. Cloudflare said that no buyer motion is required and confirmed that no proof of malicious exploitation has been discovered.

Comply with us on Google Information, LinkedIn, and X for day by day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:Access, Bypassing, Cloudflare, Enables, Host, Protections, Vulnerability, ZeroDay

Post navigation

Previous Post: TP-Link Patches Vulnerability Exposing VIGI Cameras to Remote Hacking
Next Post: New Spear-Phishing Attack Abusing Google Ads to Deliver EndRAT Malware

Related Posts

Threat Actors can Use Xanthorox AI Tool to Generate Different Malicious Code Based on Prompts Cyber Security News
New Wave of Crypto-Hijacking Infects 3,500+ Websites Cyber Security News
North Korean Hackers Attacking Developers with 338 Malicious npm Packages Cyber Security News
Threat actors Breach High Value targets like Google in Salesforce Attacks Cyber Security News
Hackers Weaponizee Amazon Simple Email Service to Send 50,000+ Malicious Emails Per Day Cyber Security News
CISA Warns of Linux Sudo Vulnerability Actively Exploited in Attacks Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Oracle’s First 2026 CPU Delivers 337 New Security Patches
  • Hackers Extensively Abuses Visual Studio Code to Execute Malicious Payloads on Victim System
  • Analysis of 6 Billion Passwords Shows Stagnant User Behavior
  • Chainlit AI Framework Flaws Enable Data Theft via File Read and SSRF Bugs
  • Google Chrome 144 Update Patches High-Severity V8 Vulnerability

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Oracle’s First 2026 CPU Delivers 337 New Security Patches
  • Hackers Extensively Abuses Visual Studio Code to Execute Malicious Payloads on Victim System
  • Analysis of 6 Billion Passwords Shows Stagnant User Behavior
  • Chainlit AI Framework Flaws Enable Data Theft via File Read and SSRF Bugs
  • Google Chrome 144 Update Patches High-Severity V8 Vulnerability

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark