You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
This week's analysis covers four vulnerabilities, with three rated critical due to their Remote Code Execution (RCE) potential. One targets a high-traffic frontend platform, while another targets a popular content management system. These detections are now part of the Cloudflare Managed Ruleset in _Block_ mode.
13
+
14
+
**Key Findings**
15
+
16
+
- Commvault Command Center (CVE-2025-34028) exposes an unauthenticated RCE via insecure command injection paths in the web UI. This is critical due to its use in enterprise backup environments.
17
+
- BentoML (CVE-2025-27520) reveals an exploitable vector where serialized payloads in model deployment APIs can lead to arbitrary command execution. This targets modern AI/ML infrastructure.
18
+
- Craft CMS (CVE-2024-56145) allows RCE through template injection in unauthenticated endpoints. It poses a significant risk for content-heavy websites with plugin extensions.
19
+
- Apache HTTP Server (CVE-2024-38475) discloses sensitive server config data due to misconfigured
20
+
`mod_proxy` behavior. While not RCE, this is useful for pre-attack recon.
21
+
22
+
**Impact**
23
+
24
+
These newly detected vulnerabilities introduce critical risk across modern web stacks, AI infrastructure, and content platforms: unauthenticated RCEs in Commvault, BentoML, and Craft CMS enable full system compromise with minimal attacker effort.
25
+
26
+
Apache HTTPD information leak can support targeted reconnaissance, increasing the success rate of follow-up exploits. Organizations using these platforms should prioritize patching and monitor for indicators of exploitation using updated WAF detection rules.
27
+
28
+
<tablestyle="width: 100%">
29
+
<thead>
30
+
<tr>
31
+
<th>Ruleset</th>
32
+
<th>Rule ID</th>
33
+
<th>Legacy Rule ID</th>
34
+
<th>Description</th>
35
+
<th>Previous Action</th>
36
+
<th>New Action</th>
37
+
<th>Comments</th>
38
+
</tr>
39
+
</thead>
40
+
<tbody>
41
+
<tr>
42
+
<td>Cloudflare Managed Ruleset</td>
43
+
<td>
44
+
<RuleIDid="5c3559ad62994e5b932d7d0075129820" />
45
+
</td>
46
+
<td>100745</td>
47
+
<td>Apache HTTP Server - Information Disclosure - CVE:CVE-2024-38475</td>
48
+
<td>Log</td>
49
+
<td>Block</td>
50
+
<td>This is a New Detection</td>
51
+
</tr>
52
+
<tr>
53
+
<td>Cloudflare Managed Ruleset</td>
54
+
<td>
55
+
<RuleIDid="28a22a685bba478d99bc904526a517f1" />
56
+
</td>
57
+
<td>100747</td>
58
+
<td>Commvault Command Center - Remote Code Execution - CVE:CVE-2025-34028</td>
0 commit comments