- Jan 14, 2026
- Parsed from source:Jan 14, 2026
- Detected by Releasebot:Jan 14, 2026
Application Security by Cloudflare
URL Scanner now supports PDF report downloads
Cloudflare URL Scanner now exports PDF reports from the dashboard alongside JSON and HAR, making it easy to share findings with non-technical stakeholders. A new PDF export button and unified documentation streamline reporting and incident response.
Key Benefits
- Consolidate scan results, including screenshots, security signatures, and metadata, into a single, portable document
- Easily share professional-grade summaries with non-technical stakeholders or legal teams for faster incident response
What’s new
- PDF Export Button: A new download option is available in the URL Scanner results page within the Cloudflare dashboard
- Unified Documentation: Access all scan details—from high-level summaries to specific security flags—in one offline-friendly file
To get started with the URL Scanner and explore our reporting capabilities, visit the URL Scanner API documentation ↗.
Original source Report a problem - Jan 12, 2026
- Parsed from source:Jan 12, 2026
- Detected by Releasebot:Jan 12, 2026
- Modified by Releasebot:Jan 14, 2026
Application Security by Cloudflare
WAF Release - 2026-01-12
Key Findings
This week's release focuses on improvements to existing detections to enhance coverage.
- Existing rule enhancements have been deployed to improve detection resilience against SQL Injection.
- Details include rule merges and action changes from Log to Block for several SQLi related beta rules.
- Jan 12, 2026
- Parsed from source:Jan 12, 2026
- Detected by Releasebot:Jan 12, 2026
- Modified by Releasebot:Jan 14, 2026
Application Security by Cloudflare
Metro code field now available in Rules
The ip.src.metro_code field in the Ruleset Engine is now populated with DMA (Designated Market Area) data.
You can use this field to build rules that target traffic based on geographic market areas, enabling more granular location-based policies for your applications.Field details
Field | Type | Description
ip.src.metro_code | String | null | The metro code (DMA) of the incoming request's IP address. Returns the designated market area code for the client's location.Example filter expression
ip.src.metro_code eq "501"For more information, refer to the Fields reference.
Original source Report a problem - Jan 12, 2026
- Parsed from source:Jan 12, 2026
- Detected by Releasebot:Jan 12, 2026
Application Security by Cloudflare
Cloudflare Threat Events now support STIX2 format
Cloudflare Threat Events now supports STIX2, enabling seamless out-of-the-box ingestion into major TIPs, SIEMs, and SOAR tools. The standard format clarifies relations between indicators, sightings, and threat actors, streamlining threat intel integration and workflows.
Release notes
Key benefits
- Eliminate the need for custom parsers, as STIX2 allows for "out of the box" ingestion into major Threat Intel Platforms (TIPs), SIEMs, and SOAR tools.
- STIX2 provides a standardized way to represent relationships between indicators, sightings, and threat actors, giving your analysts a clearer picture of the threat landscape.
For technical details on how to query events using this format, please refer to our Threat Events API Documentation.
Original source Report a problem - Dec 18, 2025
- Parsed from source:Dec 18, 2025
- Detected by Releasebot:Dec 18, 2025
- Modified by Releasebot:Jan 14, 2026
Application Security by Cloudflare
WAF Release - 2025-12-18
This week's release focuses on improvements to existing detections to enhance coverage.
Key Findings
Existing rule enhancements have been deployed to improve detection resilience against broad classes of web attacks and strengthen behavioral coverage.
Details include rule merges and action changes from Log to Block for various beta rules including Atlassian Confluence - Code Injection - CVE:CVE-2021-26084 - Beta and PostgreSQL - SQLi - Copy - Beta, and new detections with Disabled actions.
- Dec 11, 2025
- Parsed from source:Dec 11, 2025
- Detected by Releasebot:Dec 12, 2025
- Modified by Releasebot:Jan 14, 2026
Application Security by Cloudflare
WAF Release - 2025-12-11 - Emergency
Emergency release notes
This emergency release introduces rules for CVE-2025-55183 and CVE-2025-55184, targeting server-side function exposure and resource-exhaustion patterns, respectively.
Key Findings
Added coverage for Leaking Server Functions (CVE-2025-55183) and React Function DoS detection (CVE-2025-55184).
Impact
These updates strengthen protection for server-function abuse techniques (CVE-2025-55183, CVE-2025-55184) that may expose internal logic or disrupt application availability.
Details
Details include new rules with Block and Disabled actions for React - Leaking Server Functions and React - DoS.
Original source Report a problem - Dec 10, 2025
- Parsed from source:Dec 10, 2025
- Detected by Releasebot:Dec 12, 2025
- Modified by Releasebot:Jan 14, 2026
Application Security by Cloudflare
WAF Release - 2025-12-10 - Emergency
Emergency weekly release boosts React RCE detection (CVE-2025-55182) and adds two generic detections for server function exposure and resource exhaustion. Enhanced detections include Block actions, with new Block and Disabled options, strengthening protection against RCE and server abuse.
This additional week's emergency release introduces improvements to our existing rule for React – Remote Code Execution – CVE-2025-55182 - 2, along with two new generic detections covering server-side function exposure and resource-exhaustion patterns.
Key Findings
Enhanced detection logic for React – RCE – CVE-2025-55182, added Generic – Server Function Source Code Exposure, and added Generic – Server Function Resource Exhaustion.
Impact
These updates strengthen protection against React RCE exploitation attempts and broaden coverage for common server-function abuse techniques that may expose internal logic or disrupt application availability.
Details
include improved detections with Block actions and new detections with Block and Disabled actions.
Original source Report a problem - Dec 5, 2025
- Parsed from source:Dec 5, 2025
- Detected by Releasebot:Dec 6, 2025
- Modified by Releasebot:Dec 9, 2025
Application Security by Cloudflare
Updating the WAF maximum payload values
Cloudflare reinstates a 1 MB WAF payload limit for paid zones, while free zones stay protected at 1 MB. The Enterprise WAF now supports up to 1 MB per request, with paid plans able to request the limit increase via Support after prior false positive issues.
We are reinstating the maximum request-payload size the Cloudflare WAF inspects, with WAF on Enterprise zones inspecting up to 128 KB.
Key Findings
On December 5, 2025, we initially attempted to increase the maximum WAF payload limit to 1 MB across all plans. However, an automatic rollout for all customers proved impractical because the increase led to a surge in false positives for existing managed rules.
This issue was particularly notable within the Cloudflare Managed Ruleset and the Cloudflare OWASP Core Ruleset, impacting customer traffic.
Impact
Customers on paid plans can increase the limit to 1 MB for any of their zones by contacting Cloudflare Support. Free zones are already protected up to 1 MB and do not require any action.
Original source Report a problem - Dec 5, 2025
- Parsed from source:Dec 5, 2025
- Detected by Releasebot:Dec 6, 2025
- Modified by Releasebot:Dec 12, 2025
Application Security by Cloudflare
Increased WAF payload limit for all plans
Key Findings
Cloudflare WAF now inspects request-payload size of up to 1 MB across all plans to enhance our detection capabilities for React RCE (CVE-2025-55182).
React payloads commonly have a default maximum size of 1 MB. Cloudflare WAF previously inspected up to 128 KB on Enterprise plans, with even lower limits on other plans.
Update
We later reinstated the maximum request-payload size the Cloudflare WAF inspects. Refer to Updating the WAF maximum payload values for details.
Original source Report a problem - Dec 3, 2025
- Parsed from source:Dec 3, 2025
- Detected by Releasebot:Dec 4, 2025
- Modified by Releasebot:Dec 10, 2025
Application Security by Cloudflare
WAF Release - 2025-12-03 - Emergency
Key Findings
- Rule description updated to reference React – RCE – CVE-2025-55182 while retaining existing unsafe-deserialization detection.
Impact
Improved classification and traceability with no change to coverage against remote code execution attempts.
Original source Report a problem