Cloudflare Fixes ACME Validation Bug Allowing WAF Bypass to Origin Servers
Cloudflare has addressed a security vulnerability impacting its Automatic Certificate Management Environment (ACME) validation logic that made it possible to bypass security controls and access origin servers. "The vulnerability was rooted in how our edge network processed requests destined for the ACME HTTP-01 challenge path (/.well-known/acme-challenge/*)," the web infrastructure
AI Analysis
Technical Summary
Cloudflare's Automatic Certificate Management Environment (ACME) implementation contained a vulnerability in the HTTP-01 challenge validation process. ACME, defined by RFC 8555, automates SSL/TLS certificate issuance by validating domain ownership through challenges served at a specific HTTP path: /.well-known/acme-challenge/<token>. Cloudflare intercepts these requests for domains it manages and disables WAF protections to allow certificate authorities (CAs) to validate tokens without interference. However, the flawed logic failed to verify if the token in the request matched an active challenge for the requested hostname. If the token was associated with a different zone not managed by Cloudflare, the request bypassed WAF protections and was forwarded directly to the origin server. This allowed attackers to send arbitrary requests to the origin server via the ACME challenge path, effectively bypassing security controls designed to protect the origin. The vulnerability was discovered by security researcher Kirill Firsov of FearsOff in October 2025 and patched by Cloudflare on October 27, 2025. The fix restricts WAF bypass to only those requests matching valid ACME tokens for the hostname, restoring intended protections. While no malicious exploitation has been observed, the flaw could have enabled attackers to access sensitive files on origin servers, conduct reconnaissance, and potentially prepare for further attacks. The vulnerability affects all Cloudflare customers using the ACME HTTP-01 challenge mechanism, particularly those relying on Cloudflare's edge network for certificate management and WAF protections.
Potential Impact
For European organizations, this vulnerability poses a risk of unauthorized access to origin servers behind Cloudflare's protections. Attackers could bypass WAF rules, potentially exposing sensitive internal resources, configuration files, or application data. This could lead to information disclosure, aiding further targeted attacks or data breaches. Organizations in sectors such as finance, healthcare, government, and critical infrastructure that rely on Cloudflare for SSL/TLS certificate management and WAF services are particularly vulnerable. The ability to bypass WAF protections undermines a key security layer, increasing the attack surface. Although exploitation requires knowledge of the ACME challenge path and token manipulation, no authentication or user interaction is needed, making exploitation feasible for remote attackers. The vulnerability's low reported severity by Cloudflare may underestimate the risk in environments with sensitive data or strict compliance requirements. Prompt patching and validation of WAF configurations are essential to prevent potential reconnaissance and data exposure.
Mitigation Recommendations
European organizations should immediately verify that their Cloudflare services are updated with the October 27, 2025 patch that corrects the ACME validation logic. They should audit WAF configurations to ensure that rules are properly enforced on the /.well-known/acme-challenge/* path and that WAF bypass only occurs for legitimate, validated ACME tokens. Implement monitoring and alerting for unusual or unexpected requests to the ACME challenge path to detect potential exploitation attempts. Where possible, restrict access to origin servers by IP whitelisting or additional authentication layers to reduce exposure if WAF bypass occurs. Consider using DNS-01 ACME challenges instead of HTTP-01 to avoid reliance on HTTP path validation. Conduct penetration testing simulating this attack vector to confirm that WAF protections are effective. Maintain strict logging and incident response readiness to quickly identify and respond to suspicious activity related to certificate validation paths.
Affected Countries
United Kingdom, Germany, France, Netherlands, Sweden, Italy, Spain, Belgium, Poland, Ireland
Cloudflare Fixes ACME Validation Bug Allowing WAF Bypass to Origin Servers
Description
Cloudflare has addressed a security vulnerability impacting its Automatic Certificate Management Environment (ACME) validation logic that made it possible to bypass security controls and access origin servers. "The vulnerability was rooted in how our edge network processed requests destined for the ACME HTTP-01 challenge path (/.well-known/acme-challenge/*)," the web infrastructure
AI-Powered Analysis
Technical Analysis
Cloudflare's Automatic Certificate Management Environment (ACME) implementation contained a vulnerability in the HTTP-01 challenge validation process. ACME, defined by RFC 8555, automates SSL/TLS certificate issuance by validating domain ownership through challenges served at a specific HTTP path: /.well-known/acme-challenge/<token>. Cloudflare intercepts these requests for domains it manages and disables WAF protections to allow certificate authorities (CAs) to validate tokens without interference. However, the flawed logic failed to verify if the token in the request matched an active challenge for the requested hostname. If the token was associated with a different zone not managed by Cloudflare, the request bypassed WAF protections and was forwarded directly to the origin server. This allowed attackers to send arbitrary requests to the origin server via the ACME challenge path, effectively bypassing security controls designed to protect the origin. The vulnerability was discovered by security researcher Kirill Firsov of FearsOff in October 2025 and patched by Cloudflare on October 27, 2025. The fix restricts WAF bypass to only those requests matching valid ACME tokens for the hostname, restoring intended protections. While no malicious exploitation has been observed, the flaw could have enabled attackers to access sensitive files on origin servers, conduct reconnaissance, and potentially prepare for further attacks. The vulnerability affects all Cloudflare customers using the ACME HTTP-01 challenge mechanism, particularly those relying on Cloudflare's edge network for certificate management and WAF protections.
Potential Impact
For European organizations, this vulnerability poses a risk of unauthorized access to origin servers behind Cloudflare's protections. Attackers could bypass WAF rules, potentially exposing sensitive internal resources, configuration files, or application data. This could lead to information disclosure, aiding further targeted attacks or data breaches. Organizations in sectors such as finance, healthcare, government, and critical infrastructure that rely on Cloudflare for SSL/TLS certificate management and WAF services are particularly vulnerable. The ability to bypass WAF protections undermines a key security layer, increasing the attack surface. Although exploitation requires knowledge of the ACME challenge path and token manipulation, no authentication or user interaction is needed, making exploitation feasible for remote attackers. The vulnerability's low reported severity by Cloudflare may underestimate the risk in environments with sensitive data or strict compliance requirements. Prompt patching and validation of WAF configurations are essential to prevent potential reconnaissance and data exposure.
Mitigation Recommendations
European organizations should immediately verify that their Cloudflare services are updated with the October 27, 2025 patch that corrects the ACME validation logic. They should audit WAF configurations to ensure that rules are properly enforced on the /.well-known/acme-challenge/* path and that WAF bypass only occurs for legitimate, validated ACME tokens. Implement monitoring and alerting for unusual or unexpected requests to the ACME challenge path to detect potential exploitation attempts. Where possible, restrict access to origin servers by IP whitelisting or additional authentication layers to reduce exposure if WAF bypass occurs. Consider using DNS-01 ACME challenges instead of HTTP-01 to avoid reliance on HTTP path validation. Conduct penetration testing simulating this attack vector to confirm that WAF protections are effective. Maintain strict logging and incident response readiness to quickly identify and respond to suspicious activity related to certificate validation paths.
Technical Details
- Article Source
- {"url":"https://thehackernews.com/2026/01/cloudflare-fixes-acme-validation-bug.html","fetched":true,"fetchedAt":"2026-01-21T03:06:10.270Z","wordCount":1141}
Threat ID: 697042a44623b1157c81b952
Added to database: 1/21/2026, 3:06:12 AM
Last enriched: 1/21/2026, 3:07:54 AM
Last updated: 2/7/2026, 1:42:17 PM
Views: 122
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25764: CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in opf openproject
LowCVE-2026-25729: CWE-863: Incorrect Authorization in lintsinghua DeepAudit
LowCVE-2025-15320: Multiple Binds to the Same Port in Tanium Tanium Client
LowCVE-2026-25724: CWE-61: UNIX Symbolic Link (Symlink) Following in anthropics claude-code
LowCVE-2026-1337: CWE-117 Improper Output Neutralization for Logs in neo4j Enterprise Edition
LowActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.