Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Cloudflare Fixes ACME Validation Bug Allowing WAF Bypass to Origin Servers

Cloudflare Fixes ACME Validation Bug Allowing WAF Bypass to Origin Servers

Posted on January 20, 2026January 20, 2026 By CWS

Ravie LakshmananJan 20, 2026Web Safety / Vulnerability
Cloudflare has addressed a safety vulnerability impacting its Computerized Certificates Administration Surroundings (ACME) validation logic that made it potential to bypass safety controls and entry origin servers.
“The vulnerability was rooted in how our edge community processed requests destined for the ACME HTTP-01 problem path (/.well-known/acme-challenge/*),” the net infrastructure firm’s Hrushikesh Deshpande, Andrew Mitchell, and Leland Garofalo stated.
The net infrastructure firm stated it discovered no proof that the vulnerability was ever exploited in a malicious context.
ACME is a communications protocol (RFC 8555) that facilitates automated issuance, renewal, and revocation of SSL/TLS certificates. Each certificates provisioned to a web site by a certificates authority (CA) is validated utilizing challenges to show area possession.

This course of is often achieved utilizing an ACME shopper like Certbot that proves area possession by way of an HTTP-01 (or DNS-01) problem and manages the certificates lifecycle. The HTTP-01 problem checks for a validation token and a key fingerprint situated within the internet server at ” over HTTP port 80.
The CA’s server makes an HTTP GET request to that actual URL to retrieve the file. As soon as the verification succeeds, the certificates is issued and the CA marks the ACME account (i.e., the registered entity on its server) as licensed to handle that particular area.
Within the occasion the problem is utilized by a certificates order managed by Cloudflare, then Cloudflare will reply on the aforementioned path and supply the token offered by the CA to the caller. But when it doesn’t correlate to a Cloudflare-managed order, the request is routed to the shopper origin, which can be utilizing a distinct system for area validation.

The vulnerability, found and reported by FearsOff in October 2025, has to do with a flawed implementation of the ACME validation course of that causes sure problem requests to the URL to disable internet utility firewall (WAF) guidelines and permit it to achieve the origin server when it ought to have been ideally blocked.

In different phrases, the logic didn’t confirm whether or not the token within the request really matched an lively problem for that particular hostname, successfully allowing an attacker to ship arbitrary requests to the ACME path and circumvent WAF protections totally, granting them the flexibility to achieve the origin server.
“Beforehand, when Cloudflare was serving an HTTP-01 problem token, if the trail requested by the caller matched a token for an lively problem in our system, the logic serving an ACME problem token would disable WAF options, since Cloudflare can be straight serving the response,” the corporate defined.

“That is executed as a result of these options can intrude with the CA’s potential to validate the token values and would trigger failures with automated certificates orders and renewals. Nonetheless, within the situation that the token used was related to a distinct zone and never straight managed by Cloudflare, the request can be allowed to proceed onto the shopper origin with out additional processing by WAF rulesets.”
Kirill Firsov, founder and CEO of FearsOff, stated the vulnerability might be exploited by a malicious person to acquire a deterministic, lengthy‑lived token and entry delicate recordsdata on the origin server throughout all Cloudflare hosts, opening the door to reconnaissance.
The vulnerability was addressed by Cloudflare on October 27, 2025, with a code change that serves the response and disables WAF options solely when the request matches a sound ACME HTTP-01 problem token for that hostname.

The Hacker News Tags:ACME, Allowing, Bug, Bypass, Cloudflare, Fixes, Origin, Servers, Validation, WAF

Post navigation

Previous Post: Weaponized Invite Enabled Calendar Data Theft via Google Gemini
Next Post: Evelyn Stealer Malware Abuses VS Code Extensions to Steal Developer Credentials and Crypto

Related Posts

Iranian Hackers Target U.S. Networks with New Malware Iranian Hackers Target U.S. Networks with New Malware The Hacker News
Chrome 0-Day, Data Wipers, Misused Tools and Zero-Click iPhone Attacks Chrome 0-Day, Data Wipers, Misused Tools and Zero-Click iPhone Attacks The Hacker News
CastleLoader Malware Infects 469 Devices Using Fake GitHub Repos and ClickFix Phishing CastleLoader Malware Infects 469 Devices Using Fake GitHub Repos and ClickFix Phishing The Hacker News
Citrix Patches Three NetScaler Flaws, Confirms Active Exploitation of CVE-2025-7775 Citrix Patches Three NetScaler Flaws, Confirms Active Exploitation of CVE-2025-7775 The Hacker News
Pre-Auth Exploit Chains Found in Commvault Could Enable Remote Code Execution Attacks Pre-Auth Exploit Chains Found in Commvault Could Enable Remote Code Execution Attacks The Hacker News
Sneaky 2FA Phishing Kit Adds BitB Pop-ups Designed to Mimic the Browser Address Bar Sneaky 2FA Phishing Kit Adds BitB Pop-ups Designed to Mimic the Browser Address Bar The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Top Spam Filter Tools for 2026: A Comprehensive Guide
  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required
  • Iranian Hackers Compromise FBI Director’s Email, Attack Stryker

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Top Spam Filter Tools for 2026: A Comprehensive Guide
  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required
  • Iranian Hackers Compromise FBI Director’s Email, Attack Stryker

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark