In late 2025, researchers at FearsOff Security uncovered a zero-day vulnerability in Cloudflare’s Web Application Firewall (WAF) that allowed external actors to bypass all access restrictions and directly connect to backend origin servers. The exploit leveraged the ACME certificate validation endpoint, specifically the URL path /.well-known/acme-challenge/{token}, which Cloudflare had designed to facilitate SSL/TLS certificate issuance. This routine automation mechanism inadvertently created a global exposure point, turning a maintenance path into a critical WAF bypass vector.
Researchers demonstrated the issue using controlled Cloudflare-hosted demo environments:
In all cases, account-level WAF rules and custom headers (like X-middleware-subrequest) were ignored under this path, confirming that the entire WAF logic was skipped.
The researchers emphasized that with the rise of AI-driven automated exploitation tools, such hidden bypasses could have been weaponized at scale.
AI-enabled scanners could rapidly detect and exploit .well-known endpoints across the internet, turning a single certificate-validation quirk into a mass exploitation vector.
As of October 27, 2025, Cloudflare confirmed that all .well-known/acme-challenge/* paths now undergo standard WAF evaluation, restoring uniform protection and sealing the bypass.
Enjoyed reading this Threat Intelligence Advisory? Stay updated with our latest exclusive content by following us on Twitter and LinkedIn
No related posts found.
This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.
Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.
This website uses Google Analytics to collect anonymous information such as the number of visitors to the site, and the most popular pages.
Keeping this cookie enabled helps us to improve our website.
This website uses the following additional cookies:
(List the cookies that you are using on the website here.)
More information about our Cookie Policy