Cloudflare One Release Notes

Last updated: Nov 18, 2025

  • Nov 17, 2025
    • Parsed from source:
      Nov 17, 2025
    • Detected by Releasebot:
      Nov 18, 2025

    Cloudflare One by Cloudflare

    New Cloudflare One Navigation and Product Experience

    Zero Trust dashboard gets a major UX refresh with reorganized navigation, a guided login tour, and smarter search to find pages by old or new names. Some pages become tabs and settings move closer to tools; API and backend stay the same.

    The Zero Trust dashboard and navigation is receiving significant and exciting updates. The dashboard is being restructured to better support common tasks and workflows, and various pages have been moved and consolidated.
    There is a new guided experience on login detailing the changes, and you can use the Zero Trust dashboard search to find product pages by both their new and old names, as well as your created resources. To replay the guided experience, you can find it in Overview > Get Started.

    Notable changes

    • Product names have been removed from many top-level navigation items to help bring clarity to what they help you accomplish. For example, you can find Gateway policies under Traffic policies and CASB findings under Cloud & SaaS findings.
    • You can view all analytics, logs, and real-time monitoring tools from Insights.
    • Networks better maps the ways that your corporate network interacts with Cloudflare. Some pages like Tunnels, are now a tab rather than a full page as part of these changes. You can find them at Networks > Connectors.
    • Settings are now located closer to the tools and resources they impact. For example, this means youll find your WARP configurations at Team & Resources > Devices.
      No changes to our API endpoint structure or to any backend services have been made as part of this effort.
    Original source Report a problem
  • Nov 14, 2025
    • Parsed from source:
      Nov 14, 2025
    • Detected by Releasebot:
      Nov 16, 2025

    Cloudflare One by Cloudflare

    New SaaS Security weekly digests with API CASB

    Cloudflare introduces the CASB Weekly Digest, an opt-in email that delivers a Monday morning at-a-glance view of your API CASB findings, integration health, and proactive alerts. Stay on top of security without logging in, with easy opt-in in Manage Account > Notifications.

    CASB Weekly Digest notification

    You can now stay on top of your SaaS security posture with the new CASB Weekly Digest notification. This opt-in email digest is delivered to your inbox every Monday morning and provides a high-level summary of your organization's Cloudflare API CASB findings from the previous week.
    This allows security teams and IT administrators to get proactive, at-a-glance visibility into new risks and integration health without having to log in to the dashboard.
    To opt in, navigate to Manage Account > Notifications in the Cloudflare dashboard to configure the CASB Weekly Digest alert type.

    Key capabilities

    • At-a-glance summary — Review new high/critical findings, most frequent finding types, and new content exposures from the past 7 days.
    • Integration health — Instantly see the status of all your connected SaaS integrations (Healthy, Unhealthy, or Paused) to spot API connection issues.
    • Proactive alerting — The digest is sent automatically to all subscribed users every Monday morning.
    • Easy to configure — Users can opt in by enabling the notification in the Cloudflare dashboard under Manage Account > Notifications.

    Learn more

    • Configure notification preferences in Cloudflare.

    The CASB Weekly Digest notification is available to all Cloudflare users today.

    Original source Report a problem
  • Nov 11, 2025
    • Parsed from source:
      Nov 11, 2025
    • Detected by Releasebot:
      Nov 12, 2025

    Cloudflare One by Cloudflare

    WARP client for macOS (version 2025.9.558.0)

    New GA macOS WARP release adds PMTUD MTU discovery, a new GUI connection status, and tunnel/DNS health indicators. Also fixes a deletion failure report. PMTUD is off by default; known Local Domain Fallback issue affects some builds.

    Changes and improvements

    • The GUI now displays the health of the tunnel and DNS connections by showing a connection status message when the network may be unstable. This will make it easier to diagnose connectivity issues.
    • Fixed an issue where deleting a registration was erroneously reported as having failed.
    • Path Maximum Transmission Unit Discovery (PMTUD) may now be used to discover the effective MTU of the connection. This allows the WARP client to improve connectivity optimized for each network. PMTUD is disabled by default. To enable it, refer to the PMTUD documentation.

    Known issues

    • Devices using WARP client 2025.4.929.0 and up may experience Local Domain Fallback failures if a fallback server has not been configured. To configure a fallback server, refer to Route traffic to fallback server.
    Original source Report a problem
  • Nov 11, 2025
    • Parsed from source:
      Nov 11, 2025
    • Detected by Releasebot:
      Nov 12, 2025

    Cloudflare One by Cloudflare

    WARP client for Windows (version 2025.9.558.0)

    A new GA Windows WARP client release brings PMTUD-powered MTU discovery, a new GUI connection status, and Windows 11 ARM support with minor fixes. The update also refines user switch harmony and health indicators, while PMTUD remains opt-in.

    A new GA release for the Windows WARP client is now available on the stable releases downloads page.
    This release contains minor fixes, improvements, and new features including Path Maximum Transmission Unit Discovery (PMTUD). When PMTUD is enabled, the client will dynamically adjust packet sizing to optimize connection performance. There is also a new connection status message in the GUI to inform users that the local network connection may be unstable. This will make it easier to diagnose connectivity issues.

    Changes and improvements

    • Fixed an inconsistency with Global WARP override settings in multi-user environments when switching between users.
    • The GUI now displays the health of the tunnel and DNS connections by showing a connection status message when the network may be unstable. This will make it easier to diagnose connectivity issues.
    • Fixed an issue where deleting a registration was erroneously reported as having failed.
    • Path Maximum Transmission Unit Discovery (PMTUD) may now be used to discover the effective MTU of the connection. This allows the WARP client to improve connectivity optimized for each network. PMTUD is disabled by default. To enable it, refer to the PMTUD documentation.
    • Improvements for the OS version WARP client check. Windows Updated Build Revision (UBR) numbers can now be checked by the client to ensure devices have required security patches and features installed.
    • The WARP client now supports Windows 11 ARM-based machines. For information on known limitations, refer to the Known limitations page.

    Known issues

    • For Windows 11 24H2 users, Microsoft has confirmed a regression that may lead to performance issues like mouse lag, audio cracking, or other slowdowns. Cloudflare recommends users experiencing these issues upgrade to a minimum Windows 11 24H2 KB5062553 or higher for resolution.
    • Devices using WARP client 2025.4.929.0 and up may experience Local Domain Fallback failures if a fallback server has not been configured. To configure a fallback server, refer to Route traffic to fallback server.
    • Devices with KB5055523 installed may receive a warning about Win32/ClickFix.ABA being present in the installer. To resolve this false positive, update Microsoft Security Intelligence to version 1.429.19.0 or later.
    • DNS resolution may be broken when the following conditions are all true:
      • WARP is in Secure Web Gateway without DNS filtering (tunnel-only) mode.
      • A custom DNS server address is configured on the primary network adapter.
      • The custom DNS server address on the primary network adapter is changed while WARP is connected.
        To work around this issue, reconnect the WARP client by toggling off and back on.
    Original source Report a problem
  • Nov 11, 2025
    • Parsed from source:
      Nov 11, 2025
    • Detected by Releasebot:
      Nov 12, 2025

    Cloudflare One by Cloudflare

    WARP client for Linux (version 2025.9.558.0)

    A new GA Linux WARP client introduces PMTUD based MTU optimization, a GUI status message for unstable networks, and health indicators for tunnel and DNS. It also updates the Linux package public key and provides update instructions.

    A new GA release for the Linux WARP client is now available on the stable releases downloads page.
    This release contains minor fixes, improvements, and new features including Path Maximum Transmission Unit Discovery (PMTUD). When PMTUD is enabled, the client will dynamically adjust packet sizing to optimize connection performance. There is also a new connection status message in the GUI to inform users that the local network connection may be unstable. This will make it easier to diagnose connectivity issues.
    WARP client version 2025.8.779.0 introduced an updated public key for Linux packages. The public key must be updated if it was installed before September 12, 2025 to ensure the repository remains functional after December 4, 2025. Instructions to make this update are available at pkg.cloudflareclient.com.

    Changes and improvements

    • The GUI now displays the health of the tunnel and DNS connections by showing a connection status message when the network may be unstable. This will make it easier to diagnose connectivity issues.
    • Fixed an issue where deleting a registration was erroneously reported as having failed.
    • Path Maximum Transmission Unit Discovery (PMTUD) may now be used to discover the effective MTU of the connection. This allows the WARP client to improve connectivity optimized for each network. PMTUD is disabled by default. To enable it, refer to the PMTUD documentation.
    Original source Report a problem
  • Nov 6, 2025
    • Parsed from source:
      Nov 6, 2025
    • Detected by Releasebot:
      Nov 7, 2025
    • Modified by Releasebot:
      Nov 18, 2025

    Cloudflare One by Cloudflare

    Applications to be remapped to the new categories

    New application categories are live to better reflect content and manage HTTP traffic. Review and update rules to use the new categories; full remapping completes by Jan 30, 2026, with a transition window to expect traffic changes and adjust policies.

    We have previously added new application categories to better reflect their content and improve HTTP traffic management: refer to Changelog. While the new categories are live now, we want to ensure you have ample time to review and adjust any existing rules you have configured against old categories. The remapping of existing applications into these new categories will be completed by January 30, 2026. This timeline allows you a dedicated period to:

    • Review the new category structure.
    • Identify any policies you have that target the older categories.
    • Adjust your rules to reference the new, more precise categories before the old mappings change.

    Once the applications have been fully remapped by January 30, 2026, you might observe some changes in the traffic being mitigated or allowed by your existing policies. We encourage you to use the intervening time to prepare for a smooth transition.

    Applications being remappedd

    [Table of application name, existing category, new category]

    For more information on creating HTTP policies, refer to Applications and app types.

    Original source Report a problem
  • November 2025
    • No date parsed from source.
    • Detected by Releasebot:
      Nov 12, 2025

    Cloudflare One by Cloudflare

    cloudflared proxy-dns command will be removed starting February 2, 2026

    Cloudflare will remove the cloudflared proxy-dns command from new releases on Feb 2, 2026 to fix a DNS library vulnerability and boost security. The undocumented feature is deprecated in favor of officially supported DoH solutions. Migration: use Cloudflare WARP on devices or WARP Connector for servers and IoT.

    Migration paths

    Starting February 2, 2026, the cloudflared proxy-dns command will be removed from all new cloudflared releases.

    This change is being made to enhance security and address a potential vulnerability in an underlying DNS library. This vulnerability is specific to the proxy-dns command and does not affect any other cloudflared features, such as the core Cloudflare Tunnel service.

    The proxy-dns command, which runs a client-side DNS-over-HTTPS (DoH) proxy, has been an officially undocumented feature for several years. This functionality is fully and securely supported by our actively developed products.

    Versions of cloudflared released before this date will not be affected and will continue to operate. However, note that our official support policy for any cloudflared release is one year from its release date.

    End-user devices

    We strongly advise users of this undocumented feature to migrate to one of the following officially supported solutions before February 2, 2026, to continue benefiting from secure DNS-over-HTTPS.

    The preferred method for enabling DNS-over-HTTPS on user devices is the Cloudflare WARP client. The WARP client automatically secures and proxies all DNS traffic from your device, integrating it with your organization's Zero Trust policies and posture checks.

    Servers, routers, and IoT devices

    For scenarios where installing a client on every device is not possible (such as servers, routers, or IoT devices), we recommend using the WARP Connector.

    Instead of running cloudflared proxy-dns on a machine, you can install the WARP Connector on a single Linux host within your private network. This connector will act as a gateway, securely routing all DNS and network traffic from your entire subnet to Cloudflare for filtering and logging.

    Original source Report a problem
  • Oct 28, 2025
    • Parsed from source:
      Oct 28, 2025
    • Detected by Releasebot:
      Oct 28, 2025
    • Modified by Releasebot:
      Nov 16, 2025

    Cloudflare One by Cloudflare

    Access private hostname applications support all ports/protocols

    Cloudflare Access now enforces Zero Trust for any private app across all ports and protocols, not just HTTPS. Extend SSO, MFA, and device posture to SSH, RDP, databases, and other non-HTTPS services via a Cloudflare off-ramp. General availability across all plans.

    What's New

    Cloudflare Access for private hostname applications can now secure traffic on all ports and protocols. Previously, applying Zero Trust policies to private applications required the application to use HTTPS on port 443 and support Server Name Indicator (SNI). This update removes that limitation. As long as the application is reachable via a Cloudflare off-ramp, you can now enforce your critical security controls — like single sign-on (SSO), MFA, device posture, and variable session lengths — to any private application. This allows you to extend Zero Trust security to services like SSH, RDP, internal databases, and other non-HTTPS applications.

    Examples

    For example, you can now create a self-hosted application in Access for ssh.testapp.local running on port 22. You can then build a policy that only allows engineers in your organization to connect after they pass an SSO/MFA check and are using a corporate device.

    Availability

    This feature is generally available across all plans.

    Original source Report a problem
  • Oct 28, 2025
    • Parsed from source:
      Oct 28, 2025
    • Detected by Releasebot:
      Oct 29, 2025

    Cloudflare One by Cloudflare

    New Application Categories added for HTTP Traffic Management

    Gateway introduces granular application categories for finer policy control. New categories cover Business, Education, Entertainment & Events, Food & Drink, Health & Fitness, Lifestyle, Navigation, Photography & Graphic Design, and Travel. A transition window until Jan 30, 2026 lets you remap policies.

    New, more granular application categories in Gateway

    To give you precision and flexibility while creating policies to block unwanted traffic, we are introducing new, more granular application categories in the Gateway product.
    We have added the following categories to provide more precise organization and allow for finer-grained policy creation, designed around how users interact with different types of applications:

    • Business
    • Education
    • Entertainment & Events
    • Food & Drink
    • Health & Fitness
    • Lifestyle
    • Navigation
    • Photography & Graphic Design
    • Travel

    The new categories are live now, but we are providing a transition period for existing applications to be fully remapped to these new categories.
    The full remapping will be completed by January 30, 2026.
    We encourage you to use this time to:

    • Review the new category structure.
    • Identify and adjust any existing HTTP policies that reference older categories to ensure a smooth transition.

    For more information on creating HTTP policies, refer to Applications and app types.

    Original source Report a problem
  • Oct 28, 2025
    • Parsed from source:
      Oct 28, 2025
    • Detected by Releasebot:
      Oct 31, 2025

    Cloudflare One by Cloudflare

    CASB introduces new granular roles

    Cloudflare CASB adds two granular roles for finer access control: CASB Read for view-only access and CASB Admin for full config. Supports least privilege; DLP scans require the Cloudflare Zero Trust role. Roles appear under Manage Account > Members and in API tokens.

    New granular roles in Cloudflare CASB

    Cloudflare CASB (Cloud Access Security Broker) now supports two new granular roles to provide more precise access control for your security teams:

    • Cloudflare CASB Read: Provides read-only access to view CASB findings and dashboards. This role is ideal for security analysts, compliance auditors, or team members who need visibility without modification rights.
    • Cloudflare CASB: Provides full administrative access to configure and manage all aspects of the CASB product.

    These new roles help you better enforce the principle of least privilege. You can now grant specific members access to CASB security findings without assigning them broader permissions, such as the Super Administrator or Administrator roles.

    To enable Data Loss Prevention (DLP), scans in CASB, account members will need the Cloudflare Zero Trust role.

    You can find these new roles when inviting members or creating API tokens in the Cloudflare dashboard under Manage Account > Members.

    To learn more about managing roles and permissions, refer to the Manage account members and roles documentation.

    Original source Report a problem

Related products