By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Cloudflare Fixes ACME Validation Bug Allowing WAF Bypass to Origin Servers
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > Cloudflare Fixes ACME Validation Bug Allowing WAF Bypass to Origin Servers
Computing

Cloudflare Fixes ACME Validation Bug Allowing WAF Bypass to Origin Servers

News Room
Last updated: 2026/01/20 at 7:15 AM
News Room Published 20 January 2026
Share
Cloudflare Fixes ACME Validation Bug Allowing WAF Bypass to Origin Servers
SHARE

Ravie LakshmananJan 20, 2026Web Security / Vulnerability

Cloudflare has addressed a security vulnerability impacting its Automatic Certificate Management Environment (ACME) validation logic that made it possible to bypass security controls and access origin servers.

“The vulnerability was rooted in how our edge network processed requests destined for the ACME HTTP-01 challenge path (/.well-known/acme-challenge/*),” the web infrastructure company’s Hrushikesh Deshpande, Andrew Mitchell, and Leland Garofalo said.

The web infrastructure company said it found no evidence that the vulnerability was ever exploited in a malicious context.

ACME is a communications protocol (RFC 8555) that facilitates automatic issuance, renewal, and revocation of SSL/TLS certificates. Every certificate provisioned to a website by a certificate authority (CA) is validated using challenges to prove domain ownership.

Cybersecurity

This process is typically achieved using an ACME client like Certbot that proves domain ownership via an HTTP-01 (or DNS-01) challenge and manages the certificate lifecycle. The HTTP-01 challenge checks for a validation token and a key fingerprint located in the web server at “https:///.well-known/acme-challenge/” over HTTP port 80.

The CA’s server makes an HTTP GET request to that exact URL to retrieve the file. Once the verification succeeds, the certificate is issued and the CA marks the ACME account (i.e., the registered entity on its server) as authorized to manage that specific domain.

In the event the challenge is used by a certificate order managed by Cloudflare, then Cloudflare will respond on the aforementioned path and provide the token provided by the CA to the caller. But if it does not correlate to a Cloudflare-managed order, the request is routed to the customer origin, which may be using a different system for domain validation.

The vulnerability, discovered and reported by FearsOff in October 2025, has to do with a flawed implementation of the ACME validation process that causes certain challenge requests to the URL to disable web application firewall (WAF) rules and allow it to reach the origin server when it should have been ideally blocked.

In other words, the logic failed to verify whether the token in the request actually matched an active challenge for that specific hostname, effectively permitting an attacker to send arbitrary requests to the ACME path and circumvent WAF protections entirely, granting them the ability to reach the origin server.

“Previously, when Cloudflare was serving an HTTP-01 challenge token, if the path requested by the caller matched a token for an active challenge in our system, the logic serving an ACME challenge token would disable WAF features, since Cloudflare would be directly serving the response,” the company explained.

Cybersecurity

“This is done because those features can interfere with the CA’s ability to validate the token values and would cause failures with automated certificate orders and renewals. However, in the scenario that the token used was associated with a different zone and not directly managed by Cloudflare, the request would be allowed to proceed onto the customer origin without further processing by WAF rulesets.”

Kirill Firsov, founder and CEO of FearsOff, said the vulnerability could be exploited by a malicious user to obtain a deterministic, long‑lived token and access sensitive files on the origin server across all Cloudflare hosts, opening the door to reconnaissance.

The vulnerability was addressed by Cloudflare on October 27, 2025, with a code change that serves the response and disables WAF features only when the request matches a valid ACME HTTP-01 challenge token for that hostname.

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article iPhone 18 Pro Leak: Smaller Dynamic Island, No Top-Left Camera Cutout iPhone 18 Pro Leak: Smaller Dynamic Island, No Top-Left Camera Cutout
Next Article Turn your phone into a pro-level document scanner for Turn your phone into a pro-level document scanner for $40
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

In Defense of Capitalism, Even After Its Worst Excesses | HackerNoon
In Defense of Capitalism, Even After Its Worst Excesses | HackerNoon
Computing
Starling and Lloyds execs appointed to oversee City AI integration – UKTN
Starling and Lloyds execs appointed to oversee City AI integration – UKTN
News
Apple's earnings won't be dented by RAM price rises yet, says Evercore
Apple's earnings won't be dented by RAM price rises yet, says Evercore
News
Evelyn Stealer Malware Abuses VS Code Extensions to Steal Developer Credentials and Crypto
Evelyn Stealer Malware Abuses VS Code Extensions to Steal Developer Credentials and Crypto
Computing

You Might also Like

In Defense of Capitalism, Even After Its Worst Excesses | HackerNoon
Computing

In Defense of Capitalism, Even After Its Worst Excesses | HackerNoon

8 Min Read
Evelyn Stealer Malware Abuses VS Code Extensions to Steal Developer Credentials and Crypto
Computing

Evelyn Stealer Malware Abuses VS Code Extensions to Steal Developer Credentials and Crypto

4 Min Read
The Hidden Risk of Orphan Accounts
Computing

The Hidden Risk of Orphan Accounts

5 Min Read
Fedora 44 Feature Approved For Better Windows On ARM Laptop Experience
Computing

Fedora 44 Feature Approved For Better Windows On ARM Laptop Experience

2 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?