Developer Platform Updates & Release Notes
172 updates curated from 1 source by the Releasebot Team. Last updated: May 22, 2026
- May 21, 2026
- Date parsed from source:May 21, 2026
- First seen by Releasebot:May 22, 2026
Developer Platform by Cloudflare
AI Gateway - Call any AI model through AI Gateway's new REST API
Developer Platform adds AI Gateway support for the AI REST API on api.cloudflare.com, letting users call models from OpenAI, Anthropic, Google, and Workers AI through unified endpoints with shared auth. Logging, caching, rate limiting, guardrails, and Unified Billing are applied automatically.
AI Gateway now uses the AI REST API on api.cloudflare.com. You can call any model — whether from OpenAI, Anthropic, Google, or hosted on Workers AI — through one unified API, using the same endpoints and authentication regardless of provider. Four endpoints are available:
- POST /ai/run — universal endpoint for all models and modalities
- POST /ai/v1/chat/completions — OpenAI SDK compatible
- POST /ai/v1/responses — OpenAI Responses API compatible
- POST /ai/v1/messages — Anthropic SDK compatible
curl -X POST "https://api.cloudflare.com/client/v4/accounts/$CLOUDFLARE_ACCOUNT_ID/ai/v1/chat/completions" \ --header "Authorization: Bearer $CLOUDFLARE_API_TOKEN" \ --header "Content-Type: application/json" \ --data '{ "model": "openai/gpt-5.5", "messages": [{"role": "user", "content": "What is Cloudflare?"}] }'All AI Gateway features — logging, caching, rate limiting, and guardrails — are applied automatically. Third-party models are billed through Unified Billing, so you do not need to manage separate provider API keys.
Third-party model requests are routed through your account's default gateway, which is created automatically on first use. To route requests through a specific gateway, add the cf-aig-gateway-id header.
If you are already calling Workers AI models through the existing REST API, that path (/ai/run/@cf/{model}) continues to work. To call Workers AI models through AI Gateway, use the @cf/ model prefix (for example, @cf/moonshotai/kimi-k2.6) and include the cf-aig-gateway-id header to specify which gateway to route through.
For more details and examples, refer to the REST API documentation.
Original source - May 21, 2026
- Date parsed from source:May 21, 2026
- First seen by Releasebot:May 22, 2026
Developer Platform by Cloudflare
Workers VPC - Reach Cloudflare WAN destinations from Workers VPC
Developer Platform adds VPC Network bindings so Workers can reach private services across Cloudflare Tunnel, Mesh, and Cloudflare WAN on-ramps from a single network_id. It also shows how fetch() targets private destinations at runtime.
VPC Network bindings
You can now use VPC Network bindings with network_id: "cf1:network" to reach your full private network from Workers, including:
Cloudflare Mesh nodes and client devices
Subnet routes and hostname routes announced through Cloudflare Tunnel or Cloudflare Mesh
Destinations connected through Cloudflare WAN on-ramps — GRE, IPsec, and CNI
This means a single VPC Network binding can route Worker requests to private services regardless of how those services are connected to Cloudflare: through a Cloudflare Tunnel from a cloud VPC, a Mesh node on a private subnet, or a Cloudflare WAN on-ramp from your data center or branch site.
wrangler.jsonc
{ "vpc_networks": [ { "binding": "PRIVATE_NETWORK", "network_id": "cf1:network", "remote": true, }, ], }wrangler.toml
[[vpc_networks]] binding = "PRIVATE_NETWORK" network_id = "cf1:network" remote = trueAt runtime, the URL you pass to fetch() determines the destination:
// Reach a service behind a Cloudflare WAN IPsec on-ramp const response = await env.PRIVATE_NETWORK.fetch("http://10.50.0.100:8080/api");Note
For destinations behind Cloudflare WAN on-ramps (GRE, IPsec, or CNI), your network must route the Cloudflare source IP range back through the on-ramp so reply traffic returns to Cloudflare. Without this route, stateful flows will fail. This is part of standard Cloudflare WAN onboarding.
For configuration options, refer to VPC Networks.
Original source All of your release notes in one feed
Join Releasebot and get updates from Cloudflare and hundreds of other software products.
- May 19, 2026
- Date parsed from source:May 19, 2026
- First seen by Releasebot:May 20, 2026
Developer Platform by Cloudflare
Artifacts, Queues - Event subscriptions for Artifacts lifecycle events
Developer Platform adds Artifacts repository event notifications to Workers for commit-driven automation and build triggers.
You can now receive event notifications for Artifacts repository changes and consume them from a Worker to build commit-driven automation.
This allows you to:
- Run custom workflows when a repository is created or imported
- Kick off a build and deploy a change when an agent pushes to a repo
- Trigger a review agent on every push
Available events include:
- Account-level events (artifacts source) — repo.created, repo.deleted, repo.forked, repo.imported
- Repository-level events (artifacts.repo source) — pushed, cloned, fetched
To learn more, refer to Artifacts documentation.
Original source - May 18, 2026
- Date parsed from source:May 18, 2026
- First seen by Releasebot:May 18, 2026
Developer Platform by Cloudflare
Artifacts - Manage Artifacts namespaces and repos with Wrangler CLI
Developer Platform now supports managing Artifacts namespaces, repos, and repo-scoped tokens directly from Wrangler CLI, with new commands for listing, creating, getting, deleting, and issuing Git access tokens.
You can now manage Artifacts namespaces, repos, and repo-scoped tokens directly from Wrangler CLI.
Available commands:
- wrangler artifacts namespaces list — List Artifacts namespaces in your account.
- wrangler artifacts namespaces get — Get metadata for a namespace.
- wrangler artifacts repos create — Create a repo in a namespace.
- wrangler artifacts repos list — List repos in a namespace.
- wrangler artifacts repos get — Get metadata for a repo.
- wrangler artifacts repos delete — Delete a repo.
- wrangler artifacts repos issue-token — Issue a repo-scoped token for Git access.
To get started, refer to the Wrangler Artifacts commands documentation.
Original source - May 18, 2026
- Date parsed from source:May 18, 2026
- First seen by Releasebot:May 18, 2026
Developer Platform by Cloudflare
Durable Objects, Workers - Legacy `wrangler dev --remote` support removed for KV-backed Durable Objects
Developer Platform removes deprecated wrangler dev --remote support for KV-backed Durable Objects and clarifies local development guidance.
Starting 2026-05-18, support for the deprecated, legacy wrangler dev --remote flag has been removed for KV-backed Durable Objects and will return an error. The --remote flag was never supported with the recommended SQLite storage backend for Durable Objects.
For all Durable Objects, continue to use wrangler dev for local development and testing.
During local development if you need to access remote resources running on Cloudflare's network, refer to Using remote resources with Durable Objects and Workflows.
Original source - May 18, 2026
- Date parsed from source:May 18, 2026
- First seen by Releasebot:May 18, 2026
Developer Platform by Cloudflare
Workers - Share local dev servers through Cloudflare Tunnel in Wrangler and Vite
Developer Platform adds Cloudflare Tunnel support for sharing local dev sessions from Wrangler or the Cloudflare Vite plugin, giving developers a public URL for previews, webhooks, and cross-device testing with either quick temporary tunnels or named tunnels for stable access.
You can now share local dev sessions through Cloudflare Tunnel and get a public URL when using either Wrangler or the Cloudflare Vite plugin. This is useful when you need to share a preview, test a webhook, or access your app from another device.
This lets you either:
- start a temporary Quick tunnel with a random *.trycloudflare.com hostname, or
- use an existing named tunnel for a stable hostname and to restrict access with Cloudflare Access.
To start a tunnel, press t in Wrangler or t + Enter in Vite while your dev server is running. For details on setting up a named tunnel, refer to Share a local dev server.
Original source - May 15, 2026
- Date parsed from source:May 15, 2026
- First seen by Releasebot:May 16, 2026
Developer Platform by Cloudflare
R2 SQL - R2 SQL now supports JOINs, subqueries, and multi-table queries
Developer Platform adds multi-table query support to R2 SQL, bringing JOINs, subqueries, self-joins, and multi-way CTEs for richer analysis across Apache Iceberg tables in R2 Data Catalog.
R2 SQL is Cloudflare's serverless, distributed SQL engine for querying Apache Iceberg tables stored in R2 Data Catalog. R2 SQL runs directly on Cloudflare's global network with no infrastructure to manage, so you can analyze data in R2 without exporting it to an external warehouse.
R2 SQL now supports joining multiple Iceberg tables in a single query. You can combine tables with JOINs, filter with subqueries, and define multi-table CTEs to build complex analytical queries.
New capabilities
- JOINs — INNER JOIN, LEFT JOIN, RIGHT JOIN, FULL OUTER JOIN, CROSS JOIN, and implicit joins (comma-separated FROM with conditions in WHERE)
- Subqueries — IN / NOT IN, EXISTS / NOT EXISTS, scalar subqueries in SELECT / WHERE / HAVING, and derived tables (subqueries in FROM)
- Multi-table CTEs — WITH clauses can reference different tables and include JOINs
- Self-joins — join a table with itself using different aliases
- Multi-way joins — join three or more tables in a single query
Examples
Two-table JOIN with aggregation
SELECT z.domain, z.plan, COUNT(*) AS request_count FROM my_namespace.zones z INNER JOIN my_namespace.http_requests h ON z.zone_id = h.zone_id WHERE z.plan = 'enterprise' GROUP BY z.domain, z.plan ORDER BY request_count DESC LIMIT 20EXISTS subquery
SELECT z.domain, z.plan FROM my_namespace.zones z WHERE EXISTS ( SELECT 1 FROM my_namespace.firewall_events f WHERE f.zone_id = z.zone_id AND f.action = 'block' ) ORDER BY z.domain LIMIT 20Multi-table CTE with JOIN
WITH top_zones AS ( SELECT zone_id, COUNT(*) AS req_count FROM my_namespace.http_requests GROUP BY zone_id ORDER BY req_count DESC LIMIT 50 ), zone_threats AS ( SELECT zone_id, COUNT(*) AS threat_count FROM my_namespace.firewall_events WHERE risk_score > 0.5 GROUP BY zone_id ) SELECT tz.zone_id, tz.req_count, COALESCE(zt.threat_count, 0) AS threat_count FROM top_zones tz LEFT JOIN zone_threats zt ON tz.zone_id = zt.zone_id ORDER BY tz.req_count DESC LIMIT 20For the full syntax reference, refer to the SQL reference. For performance guidance with joins, refer to Limitations and best practices.
Original source - May 14, 2026
- Date parsed from source:May 14, 2026
- First seen by Releasebot:May 15, 2026
Developer Platform by Cloudflare
Workers - New Domains tab in the Workers dashboard
Developer Platform adds a Domains tab in Workers dashboard for buying, connecting, and managing Worker routing and access.
Go to Workers & Pages
In your Worker's dashboard, there is now a dedicated Domains tab where you can purchase a new domain through Cloudflare Registrar and have it automatically connected, add an existing domain, and manage all of your Worker's routing in one place.
You can also enable or disable your workers.dev subdomain and Preview URLs, put them behind Cloudflare Access to require sign-in, and jump directly to analytics or domain overview for any connected domain.
To get started, go to Workers & Pages, select a Worker, and open the Domains tab.
Original source - May 13, 2026
- Date parsed from source:May 13, 2026
- First seen by Releasebot:May 13, 2026
Developer Platform by Cloudflare
Agents, Workers - Agents SDK v0.12.4: chat recovery, routing retries, durable Think submissions, and Voice connection control
Developer Platform releases a more reliable Agents SDK with better chat recovery, stronger state sync and reconnect handling, durable Think submissions, routing retry controls, and new Voice agent connection options, plus fixes for streaming, tool output, and recovery edge cases.
Chat recovery improvements
@cloudflare/ai-chat now keeps server turns running when a browser or client stream is interrupted. This is useful for long-running AI responses where users refresh the page, close a tab, or temporarily lose connection. Calling stop() still cancels the server turn.
Set cancelOnClientAbort: true if browser or client aborts should also cancel the server turn:
JavaScript
const chat = useAgentChat({ agent: "assistant", name: "user-123", cancelOnClientAbort: true, });TypeScript
const chat = useAgentChat({ agent: "assistant", name: "user-123", cancelOnClientAbort: true, });Notable bug fixes:
Chat stream resume negotiation no longer throws when replay races with a closed WebSocket connection.
Recovered chat continuations no longer leave useAgentChat stuck in a streaming state when the original socket disconnects before a terminal response.
Approval auto-continuation preserves reasoning parts and persists continuation reasoning in the final message.
isServerStreaming now resets correctly when a resumed stream moves from the fallback observer path to a transport-owned stream.
Agent state and routing fixes
[email protected] prevents duplicate initial state frames during WebSocket connection setup. This avoids stale initial state messages overwriting state updates already sent by the client.
Agent recovery is also more reliable when tool calls span a Durable Object restart. Recovery now defers user finish hooks until after agent startup and isolates hook failures, so one failed hook does not block other recovered runs from finalizing.
getAgentByName() now supports routingRetry for transient Durable Object routing failures:
JavaScript
import { getAgentByName } from "agents"; const agent = await getAgentByName(env.AssistantAgent, "user-123", { routingRetry: { maxAttempts: 3, }, });TypeScript
import { getAgentByName } from "agents"; const agent = await getAgentByName(env.AssistantAgent, "user-123", { routingRetry: { maxAttempts: 3, }, });Durable Think submissions
@cloudflare/think now supports durable programmatic submissions. submitMessages() provides durable acceptance, idempotent retries, status inspection, cancellation, and cleanup for server-driven turns that should continue after the caller returns.
Think.chat() RPC turns now run inside chat recovery fibers and persist their stream chunks. Interrupted sub-agent turns can recover partial output instead of starting over.
ChatOptions.tools has been removed from the TypeScript API. Define durable tools on the child agent or use agent tools for orchestration. Runtime options.tools values passed by legacy callers are ignored with a warning.
Think message pruning behavior change
@cloudflare/think no longer applies pruneMessages({ toolCalls: "before-last-2-messages" }) to model context by default. The previous default could strip client-side tool results from longer multi-turn flows.
truncateOlderMessages still runs as before, so context cost remains bounded. Subclasses that relied on the old aggressive pruning can opt back in from beforeTurn:
JavaScript
import { Think } from "@cloudflare/think"; import { pruneMessages } from "ai"; export class MyAgent extends Think { beforeTurn(ctx) { return { messages: pruneMessages({ messages: ctx.messages, toolCalls: "before-last-2-messages", }), }; } }TypeScript
import { Think } from "@cloudflare/think"; import { pruneMessages } from "ai"; export class MyAgent extends Think<Env> { beforeTurn(ctx) { return { messages: pruneMessages({ messages: ctx.messages, toolCalls: "before-last-2-messages", }), }; } }Voice agent connection control
@cloudflare/voice adds an enabled option to useVoiceAgent. React apps can now delay creating and connecting a VoiceClient until prerequisites such as capability tokens are ready.
JavaScript
const voice = useVoiceAgent({ agent: "MyVoiceAgent", enabled: Boolean(token), });TypeScript
const voice = useVoiceAgent({ agent: "MyVoiceAgent", enabled: Boolean(token), });This release also fixes Workers AI speech-to-text session edge cases and withVoice text streaming from AI SDK textStream responses.
Other improvements
- Streamable HTTP routing — Server-to-client requests now route through the originating POST stream when no standalone SSE stream is available.
- Structured tool output — Tool output shapes are preserved when truncating older messages or oversized persisted rows.
- Non-chat Think tool steps — Think agent-tool children can complete without emitting assistant text and can return structured output through getAgentToolOutput.
- Sub-agent schedules — Stale sub-agent schedule rows are pruned when their owning facet registry entry no longer exists.
- @cloudflare/codemode — Adds a browser-safe export with an iframe sandbox executor and resolves OpenAPI specs inside the sandbox to avoid Worker Loader RPC size limits.
Upgrade
To update to the latest version:
npm i agents@latest @cloudflare/ai-chat@latest @cloudflare/think@latest @cloudflare/voice@latestRefer to the Agents API reference and Chat agents documentation for more information.
Original source - May 12, 2026
- Date parsed from source:May 12, 2026
- First seen by Releasebot:May 13, 2026
Developer Platform by Cloudflare
Containers - SSH through Wrangler is now enabled by default for Containers
Developer Platform adds default SSH access for Containers through wrangler containers ssh, with authentication tied to Cloudflare account and required authorized_keys. The change keeps containers private and lets teams disable SSH in configuration.
SSH through Wrangler is now enabled by default for Containers. Previously, you had to set
ssh.enabledto true in your Container configuration before you could connect.This change does not expose any publicly accessible ports on your Container. The SSH service is reachable only through
wrangler containers ssh, which authenticates against your Cloudflare account. You also need to add an ssh-ed25519 public key toauthorized_keysbefore anyone can connect, so enabling SSH alone does not grant access.To connect, add a public key to your Container configuration and run
wrangler containers ssh <INSTANCE_ID>:{ "containers": [ { "authorized_keys": [ { "name": "<NAME>", "public_key": "<YOUR_PUBLIC_KEY_HERE>", }, ], }, ], }[[containers]] [[containers.authorized_keys]] name = "<NAME>" public_key = "<YOUR_PUBLIC_KEY_HERE>"To disable SSH, set
ssh.enabledto false in your Container configuration:{ "containers": [ { "ssh": { "enabled": false, }, }, ], }[[containers]] [containers.ssh] enabled = falseFor more information, refer to the SSH documentation.
Original source - May 12, 2026
- Date parsed from source:May 12, 2026
- First seen by Releasebot:May 12, 2026
Developer Platform by Cloudflare
R2 - R2 Data Catalog now exposes metrics via the GraphQL Analytics API
Developer Platform adds GraphQL Analytics API support for R2 Data Catalog warehouses, with new datasets for catalog operations and table maintenance metrics. It helps users monitor request volume, latency, job success rates, and performance across warehouses, namespaces, and tables.
R2 Data Catalog is a managed Apache Iceberg data catalog built directly into your R2 bucket that allows you to connect query engines like R2 SQL, Spark, Snowflake, and DuckDB to your data in R2.
You can now query analytics for your R2 Data Catalog warehouses via Cloudflare's GraphQL Analytics API. Two new datasets are available:
r2CatalogDataOperationsAdaptiveGroups tracks Iceberg REST API requests made to your catalog, including operation type, request duration, HTTP status, and request body bytes. Use this to monitor request volume and latency across warehouses, namespaces, and tables.
r2CatalogTableMaintenanceAdaptiveGroups tracks table maintenance jobs such as compaction and snapshot expiration. Use this to monitor job success rates, files processed, bytes read and written, and job duration.
Both datasets support filtering by warehouse name, namespace, table name, and time range. They also include percentile aggregations for duration metrics.
For detailed schema information and example queries, refer to the R2 Data Catalog metrics and analytics documentation.
Original source - May 8, 2026
- Date parsed from source:May 8, 2026
- First seen by Releasebot:May 9, 2026
Developer Platform by Cloudflare
Workers AI - Planned model deprecations on Workers AI
Developer Platform refreshes the Workers AI model catalog with newer model options and deprecation notices for older models. It extends Kimi K2.5 deprecation to May 30, 2026, adds recommended replacements, and keeps -fast and -lora variants active for now.
We are refreshing the Workers AI model catalog to make room for newer releases. Please update your apps to remove references to the models listed below before the deprecation date.
Recommended replacements
- @cf/zai-org/glm-4.7-flash — fast multilingual model with multi-turn tool calling and coding capabilities.
- @cf/google/gemma-4-26b-a4b-it — efficient open model with vision and tool calling.
- @cf/moonshotai/kimi-k2.6 — capable tool-calling and vision model for agentic workloads and coding.
For pricing, refer to the Workers AI pricing page.
Kimi K2.5
We originally stated Kimi K2.5 would be deprecated on May 10, 2026, however we have extended the deprecation date to May 30, 2026. Requests will be automatically aliased to Kimi K2.6 on May 30, 2026, which has a higher price. Please review the @cf/moonshotai/kimi-k2.6 pricing and model capabilities prior to May 30, 2026 to ensure that the model suits your needs.
Models deprecated on May 30, 2026
- @cf/moonshotai/kimi-k2.5 --> @cf/moonshotai/kimi-k2.6
- @hf/meta-llama/meta-llama-3-8b-instruct
- @cf/meta/llama-3-8b-instruct
- @cf/meta/llama-3-8b-instruct-awq
- @cf/meta/llama-3.1-8b-instruct
- @cf/meta/llama-3.1-8b-instruct-awq
- @cf/meta/llama-3.1-70b-instruct
- @cf/meta/llama-2-7b-chat-int8
- @cf/meta/llama-2-7b-chat-fp16
- @cf/mistral/mistral-7b-instruct-v0.1
- @hf/mistral/mistral-7b-instruct-v0.2
- @hf/google/gemma-7b-it
- @cf/google/gemma-3-12b-it
- @hf/nousresearch/hermes-2-pro-mistral-7b
- @cf/microsoft/phi-2
- @cf/defog/sqlcoder-7b-2
- @cf/unum/uform-gen2-qwen-500m
- @cf/facebook/bart-large-cnn
Variants that remain active
The -fast and -lora variants of models will remain active, including:
- @cf/meta/llama-3.3-70b-instruct-fp8-fast
- @cf/meta/llama-3.1-8b-instruct-fast
- @cf/google/gemma-7b-it-lora
- @cf/google/gemma-2b-it-lora
- @cf/mistral/mistral-7b-instruct-v0.2-lora
- @cf/meta-llama/llama-2-7b-chat-hf-lora
LoRA models may be deprecated in the future. We will be adding more LoRA capabilities to the catalog, and will communicate when new LoRA models come online to give users time to train new LoRAs before we deprecate old ones.
For the full list of available models, refer to the Workers AI model catalog.
Original source - May 7, 2026
- Date parsed from source:May 7, 2026
- First seen by Releasebot:May 13, 2026
Developer Platform by Cloudflare
Workers, WAF - WAF and framework adapter mitigations for React and Next.js vulnerabilities
Developer Platform issues a security update for React Server Components and Next.js, highlighting newly disclosed vulnerabilities and recommending immediate upgrades to patched React and Next.js versions. It also notes Cloudflare WAF coverage, plus adapter hardening for Vinext and OpenNext.
WAF protections
Multiple security vulnerabilities were disclosed by the React team and Vercel affecting React Server Components and Next.js. These include denial of service, middleware and proxy bypass, server-side request forgery, cross-site scripting, and cache poisoning issues across a range of severity levels.
We strongly recommend updating your application and its dependencies immediately. Patched versions are available for React (react-server-dom-webpack, react-server-dom-parcel, and react-server-dom-turbopack 19.0.6, 19.1.7, and 19.2.6) and Next.js (15.5.16 and 16.2.5).
Cloudflare WAF rules deployed in response to prior React Server Component CVEs (CVE-2025-55184 and CVE-2026-23864) already provide coverage for the newly disclosed denial-of-service vulnerabilities. These rules are enabled by default with a Block action for all customers using the Cloudflare Managed Ruleset, including Free plan customers using the Free Managed Ruleset.
Ruleset
- Rule description
- Rule ID
- Default action
- Cloudflare Managed Ruleset
- React - DoS - CVE-2025-55184
- 2694f1610c0b471393b21aef102ec699
- Block
- Cloudflare Managed Ruleset
- React - DoS - CVE-2026-23864
- aaede80b4d414dc89c443cea61680354
- Block
The existing rules detect the underlying attack patterns generically. As a result, they apply to the new CVE-2026-23870 denial-of-service vulnerability in Server Components and the corresponding Next.js advisory GHSA-8h8q-6873-q5fj.
Cloudflare is investigating whether WAF rules can be safely and effectively deployed for three of the high-severity advisories: CVE-2026-23870 / GHSA-8h8q-6873-q5fj, GHSA-267c-6grr-h53f, and GHSA-mg66-mrh9-m8jx. If it is possible to create a managed WAF rule that mitigates these CVEs and does not potentially break application behavior, Cloudflare will add additional managed WAF rules. These rules will be announced through the WAF changelog. Because these vulnerabilities were shared with Cloudflare with minimal advance notice, we are still investigating what WAF mitigations are possible.
Several of the disclosed vulnerabilities are not possible to block in WAF. We strongly recommend updating your applications so they are not purely reliant on WAF mitigations.
Customers on Pro, Business, or Enterprise plans should ensure that Managed Rules are enabled.
Next.js adapters
Vinext: Vinext is a Vite plugin that reimplements the Next.js API surface. Vinext's latest release is not vulnerable to any of the disclosed CVEs. Vinext's architecture differs from stock Next.js in ways that sidestep the affected code paths. For example, it does not implement the PPR resume protocol, does not expose Pages Router data-route endpoints, and strips internal headers such as x-nextjs-data at request boundaries. As an extra layer of defense, we added a React 19.2.6 or later requirement when running vinext init (PR #1118, PR #1112) to prevent accidentally running a vulnerable version of React with Vinext.
OpenNext on Cloudflare: OpenNext is an adapter that lets you deploy Next.js apps to the Cloudflare Workers platform. OpenNext itself is not directly vulnerable to the React denial-of-service CVE, but users must update the Next.js version in their application. The OpenNext team has updated the adapter to further harden against these vectors and released a new version of the Cloudflare adapter. Test fixtures and examples have been updated to use patched versions (PR #1255).
Summary of disclosed vulnerabilities
Advisory
- Severity
- Issue
- WAF status
- CVE-2026-23870 / GHSA-8h8q-6873-q5fj
- High
- Denial of service in Server Components
- WAF rules in place: 2694f1610c0b471393b21aef102ec699, aaede80b4d414dc89c443cea61680354
- Cloudflare is investigating additional managed WAF coverage
- GHSA-267c-6grr-h53f
- High
- Middleware bypass via segment-prefetch routes
- Cloudflare is investigating if this can be safely and effectively mitigated by a managed WAF rule
- GHSA-mg66-mrh9-m8jx
- High
- Denial of service via connection exhaustion in Cache Components
- Cloudflare is investigating if this can be safely and effectively mitigated by a managed WAF rule
- GHSA-492v-c6pp-mqqv
- High
- Middleware bypass via dynamic route parameter injection
- Not possible to safely enable a managed WAF rule without potentially breaking application behavior
- GHSA-c4j6-fc7j-m34r
- High
- SSRF via WebSocket upgrades
- Not possible to safely enable a managed WAF rule without potentially breaking application behavior
- GHSA-36qx-fr4f-26g5
- High
- Middleware bypass in Pages Router i18n
- Custom WAF rule possible; global managed rule could potentially break application behavior
- GHSA-ffhc-5mcf-pf4q
- Moderate
- XSS via CSP nonces
- Custom WAF rule possible; global managed rule could potentially break application behavior
- GHSA-gx5p-jg67-6x7h
- Moderate
- XSS in beforeInteractive scripts
- Not possible to safely enable a managed WAF rule without potentially breaking application behavior
- GHSA-h64f-5h5j-jqjh
- Moderate
- Denial of service in Image Optimization API
- Custom WAF rule possible; global managed rule could potentially break application behavior
- GHSA-wfc6-r584-vfw7
- Moderate
- Cache poisoning in RSC responses
- Custom WAF rule possible; global managed rule could potentially break application behavior
- GHSA-vfv6-92ff-j949
- Low
- Cache poisoning via RSC cache-busting collisions
- Not possible to safely enable a managed WAF rule without potentially breaking application behavior
- GHSA-3g8h-86w9-wvmq
- Low
- Middleware redirect cache poisoning
- Custom WAF rule possible; global managed rule could potentially break application behavior
- May 7, 2026
- Date parsed from source:May 7, 2026
- First seen by Releasebot:May 7, 2026
Developer Platform by Cloudflare
Stream - Introducing Stream Bindings for Workers
Developer Platform adds Stream bindings for Workers, letting users upload videos, create direct upload links, manage metadata and captions, and generate signed playback URLs without authenticated API calls. It also supports building video pipelines in Workers and AI-driven video uploads.
You can now interact with your Stream video library using new bindings for Workers! This allows customers to upload content to Stream, provision direct uploads, manage videos, and generate signed URLs from a Worker without making authenticated API calls. We're excited to bring Stream and Workers closer together to empower more programmatic pipelines, tighter integrations, and support generative AI and inference workloads.
Use the Stream binding when you want to:
- Upload videos from URLs or create basic direct upload links for end users
- Generate signed playback tokens without managing signing keys
- Manage video metadata, captions, downloads, and watermarks
- Build video pipelines entirely within Workers
To get started, add the Stream binding to your Wrangler configuration:
wrangler.jsonc
{ "$schema": "./node_modules/wrangler/config-schema.json", "stream": { "binding": "STREAM" } }wrangler.toml
[stream] binding = "STREAM"Generate a video with AI and upload directly to Stream or send a URL of a file you already have:
JavaScript
const aiResponse = await env.AI.run( "google/veo-3.1", { prompt: "A dog walking next to a river", duration: "10s", aspect_ratio: "16:9", resolution: "1080p", generate_audio: true, }, { gateway: { id: "experiments" }, }, ); // Veo will return a URL of the generated asset. const videoUrl = aiResponse.result.video; // Alternative option: a video of the Austin Office mobile // const videoUrl = 'https://pub-d9fcbc1abcd244c1821f38b99017347f.r2.dev/aus-mobile.mp4'; // Upload to Stream by providing a URL const streamVideo = await env.STREAM.upload(videoUrl); // The streamVideo response will include the video ID, playback and manifest // URLs, and other information, just like the REST API.TypeScript
const aiResponse = await env.AI.run( 'google/veo-3.1', { prompt: 'A dog walking next to a river', duration: '10s', aspect_ratio: '16:9', resolution: '1080p', generate_audio: true, }, { gateway: { id: 'experiments' }, }, ); // Veo will return a URL of the generated asset. const videoUrl = aiResponse.result.video; // Alternative option: a video of the Austin Office mobile // const videoUrl = 'https://pub-d9fcbc1abcd244c1821f38b99017347f.r2.dev/aus-mobile.mp4'; // Upload to Stream by providing a URL const streamVideo = await env.STREAM.upload(videoUrl); // The streamVideo response will include the video ID, playback and manifest // URLs, and other information, just like the REST API.Generate a signed URL without using a signing key or an API call:
JavaScript
const video_id = "ce800be43a9772f4bb02f35b860fb516"; const token = await env.STREAM.video(video_id).generateToken(); // Use the "token" in an iframe embed code, manifest URL, or thumbnail: const embedUrl = `https://customer-igynxd2rwhmuoxw8.cloudflarestream.com/${token}/iframe`;TypeScript
const video_id = 'ce800be43a9772f4bb02f35b860fb516'; const token = await env.STREAM.video(video_id).generateToken(); // Use the "token" in an iframe embed code, manifest URL, or thumbnail: const embedUrl = `https://customer-igynxd2rwhmuoxw8.cloudflarestream.com/${token}/iframe`;Get and set video properties easily:
JavaScript
const video_id = "46c8b7f480d410840758c1cb14a72e47"; const result = await env.STREAM.video(video_id).details(); await env.STREAM.video(video_id).update({ meta: { name: "sample video" }, });TypeScript
const video_id = '46c8b7f480d410840758c1cb14a72e47'; const result = await env.STREAM.video(video_id).details(); await env.STREAM.video(video_id).update({ meta: { name: 'sample video' } });For setup instructions and the full API reference, refer to Bind to Workers API.
Get started with your Agent
Add a binding for Cloudflare Stream (env.STREAM). On the watch page, use the Stream binding to get info based on the ID, and leverage video.meta.name as the page title.
Original source - May 7, 2026
- Date parsed from source:May 7, 2026
- First seen by Releasebot:May 7, 2026
Developer Platform by Cloudflare
Workers - Automatic tracing across Durable Object and Worker subrequests
Developer Platform now supports unified Worker-to-Worker tracing with automatic trace context propagation, so service binding and Durable Object calls appear as nested spans in one trace view for easier debugging in Cloudflare dashboards and OpenTelemetry tools.
You can now get a single unified trace across Worker-to-Worker subrequests, with trace context propagating automatically. Previously, automatic tracing produced disconnected traces when a Worker called another Worker through a service binding or Durable Object.
This means you can:
- Follow a request through your entire Worker architecture in one trace view
- See service binding and Durable Object calls as nested child spans instead of separate traces
- Debug cross-Worker request flows in the Cloudflare dashboard or in an external observability platform via OpenTelemetry
Tracing must be enabled in your Wrangler configuration for traces to be recorded. Checkout Workers tracing to get started.
Up next, we are working on external trace context propagation using W3C Trace Context standards, which will allow traces from your Workers to link with traces from services outside of Cloudflare.
Original source
Curated by the Releasebot team
Releasebot is an aggregator of official product update announcements from hundreds of software vendors and thousands of sources.
Our editorial process involves the manual review and audit of release notes procured with the help of automated systems.
Similar to Developer Platform with recent updates:
- Cloudflare AI updates93 release notes · Latest May 21, 2026
- Claude Developer Platform updates122 release notes · Latest May 19, 2026
- Claude Code updates319 release notes · Latest May 22, 2026
- Gemini API updates124 release notes · Latest May 19, 2026
- Claude updates90 release notes · Latest May 21, 2026
- Anthropic updates41 release notes · Latest May 13, 2026