Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Azure AD Conditional Access Bypass: Phantom Device PR
May 6, 2026
Critical Palo Alto Firewall Vulnerability Exploited for Root Access
May 6, 2026
Optimize SOC Costs & Boost Confidence with Better Threat Intelligence
May 5, 2026
Home/CyberSecurity News/Cloudflare Zero-Day Allows Any Host Access Byp Vulnerability Enables
CyberSecurity News

Cloudflare Zero-Day Allows Any Host Access Byp Vulnerability Enables

A critical zero-day vulnerability has been identified within Cloudflare’s Web Application Firewall (WAF). This flaw permitted attackers to bypass security controls, enabling direct access to...

Marcus Rodriguez
Marcus Rodriguez
January 19, 2026 3 Min Read
0 0

A critical zero-day vulnerability has been identified within Cloudflare’s Web Application Firewall (WAF). This flaw permitted attackers to bypass security controls, enabling direct access to protected origin servers by exploiting a certificate validation path.

Security researchers from FearsOff discovered that requests targeting the /.well-known/acme-challenge/ directory could reach origins even when customer-configured WAF rules explicitly blocked all other traffic.

The Automatic Certificate Management Environment (ACME) protocol automates SSL/TLS certificate validation by requiring Certificate Authorities (CAs) to verify domain ownership.

In the HTTP-01 validation method, CAs expect websites to serve a one-time token at /.well-known/acme-challenge/{token}. This path exists on nearly every modern website as a silent maintenance route for automated certificate issuance.

The design intention limits this access to a single validation bot checking one specific file, not as an open gateway to the origin server.

Cloudflare Zero-Day Vulnerability

FearsOff researchers detected the vulnerability while reviewing applications where WAF configurations blocked global access and permitted only specific sources.

Testing revealed that requests directed at the ACME challenge path bypassed WAF rules entirely, allowing the origin server to respond directly instead of returning Cloudflare’s block page.

To confirm this wasn’t a tenant-specific misconfiguration, researchers created controlled demonstration hosts at cf-php.fearsoff.org, cf-spring.fearsoff.org, and cf-nextjs.fearsoff.org.

Normal requests to these hosts encountered block pages as expected, but ACME path requests returned origin-generated responses, typically framework 404 errors.

The vulnerability stemmed from Cloudflare’s edge network processing logic for ACME HTTP-01 challenge paths. When Cloudflare served challenge tokens for its own managed certificate orders, the system disabled WAF features to prevent interference with CA validation.

However, a critical flaw emerged: if the requested token didn’t match a Cloudflare-managed certificate order, the request bypassed WAF evaluation entirely and proceeded directly to the customer origin.

This logic error transformed a narrow certificate validation exception into a broad security bypass affecting all hosts behind Cloudflare protection.

The bypass allowed researchers to demonstrate multiple attack vectors against common web frameworks. On Spring/Tomcat applications, servlet path traversal techniques using ..;/ accessed sensitive actuator endpoints that exposed process environments, database credentials, API tokens, and cloud keys.

Next.js server-side rendering applications leaked operational data through direct origin responses that were never intended for public internet access.

PHP applications with local file inclusion vulnerabilities became exploitable, allowing attackers to access the file system via malicious path parameters. Beyond framework-specific attacks, account-level WAF rules configured to block requests based on custom headers were completely ignored for ACME path traffic.

FearsOff reported the vulnerability through Cloudflare’s HackerOne bug bounty program on October 9, 2025. Cloudflare initiated validation on October 13, 2025, and HackerOne triaged the issue on October 14, 2025.

The company deployed a permanent fix on October 27, 2025, modifying the code to disable security features only when requests match valid ACME HTTP-01 challenge tokens for the specific hostname.

Post-fix testing confirmed WAF rules now apply uniformly across all paths, including the previously vulnerable ACME challenge route. Cloudflare stated that no customer action is required and confirmed that no evidence of malicious exploitation has been found.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackExploitHackerSecurityVulnerabilityzero-day

Share Article

Marcus Rodriguez

Marcus Rodriguez

Marcus is a security researcher and investigative journalist with expertise in vulnerability research, bug bounties, and cloud security. Since 2017, Marcus has been breaking stories on critical vulnerabilities affecting major platforms. His investigative work has led to the disclosure of numerous security flaws and improved defenses across the industry. Marcus is an active participant in bug bounty programs and has been recognized for responsible disclosure practices. He holds multiple security certifications and regularly speaks at industry events.

Previous Post

New Spear-Phishing Abuses Google Ads to Deliver End

Next Post

Attackers Redirect Employee Paychecks, No System Breach

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Critical Weaver E-cology RCE Actively Exploited Vulnerability Attacks
May 5, 2026
Cisco Acquires Astrix Security to Boost Strengthen Agent
May 5, 2026
China-Aligned SHADOW-EARTH-053 Exploits Exchange Servers to Deploy
May 5, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Jennifer sherman
Jennifer sherman
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us