How we mitigated a vulnerability in Cloudflare’s ACME validation logic
嗯,用户让我用中文帮他总结一篇文章,控制在一百个字以内,而且不需要特定的开头。好的,我得先仔细看看这篇文章的内容。 文章主要讲的是Cloudflare的一个安全漏洞,这个漏洞是在ACME验证逻辑中发现的,导致某些WAF功能被禁用。研究人员通过漏洞赏金计划报告了这个问题。然后文章解释了ACME的工作原理,以及Cloudflare是如何修复这个漏洞的。最后提到客户不需要采取行动,也没有恶意攻击者利用这个漏洞。 好的,我需要把这些信息浓缩到100字以内。首先提到Cloudflare发现了漏洞,然后描述漏洞的影响和修复措施,最后说明客户的安全情况。 可能的结构是:Cloudflare发现并修复了ACME中的漏洞,导致WAF功能被禁用。研究人员通过赏金计划报告了问题。修复后客户无需行动,未被滥用。 再检查一下字数,确保不超过100字。 </think> Cloudflare修复了ACME验证逻辑中的漏洞,该漏洞可能导致某些WAF功能被禁用,并允许未经验证的请求绕过安全措施。研究人员通过Cloudflare的漏洞赏金计划报告了这一问题。修复后无需客户操作,未发现恶意利用。 2026-1-19 14:0:0 Author: blog.cloudflare.com(查看原文) 阅读量:0 收藏

2026-01-19

2 min read

On October 13, 2025, security researchers from FearsOff identified and reported a vulnerability in Cloudflare's ACME (Automatic Certificate Management Environment) validation logic that disabled some of the WAF features on specific ACME-related paths. The vulnerability was reported and validated through Cloudflare’s bug bounty program.

The vulnerability was rooted in how our edge network processed requests destined for the ACME HTTP-01 challenge path (/.well-known/acme-challenge/*).

Here, we’ll briefly explain how this protocol works and the action we took to address the vulnerability. 

Cloudflare has patched this vulnerability and there is no action necessary for Cloudflare customers. We are not aware of any malicious actor abusing this vulnerability.

How ACME works to validate certificates

ACME is a protocol used to automate the issuance, renewal, and revocation of SSL/TLS certificates. When an HTTP-01 challenge is used to validate domain ownership, a Certificate Authority (CA) will expect to find a validation token at the HTTP path following the format of http://{customer domain}/.well-known/acme-challenge/{token value}

If this challenge is used by a certificate order managed by Cloudflare, then Cloudflare will respond on this path and provide the token provided by the CA to the caller. If the token provided does not correlate to a Cloudflare managed order, then this request would be passed on to the customer origin, since they may be attempting to complete domain validation as a part of some other system. Check out the flow below for more details — other use cases are discussed later in the blog post.

BLOG-3067 2

The underlying logic flaw 

Certain requests to /.well-known/acme-challenge/* would cause the logic serving ACME challenge tokens to disable WAF features on a challenge request, and allow the challenge request to continue to the origin when it should have been blocked.

Previously, when Cloudflare was serving a HTTP-01 challenge token, if the path requested by the caller matched a token for an active challenge in our system, the logic serving an ACME challenge token would disable WAF features, since Cloudflare would be directly serving the response. This is done because those features can interfere with the CA’s ability to validate the token values and would cause failures with automated certificate orders and renewals.

However, in the scenario that the token used was associated with a different zone and not directly managed by Cloudflare, the request would be allowed to proceed onto the customer origin without further processing by WAF rulesets.

How we mitigated this vulnerability

To mitigate this issue, a code change was released. This code change only allows the set of security features to be disabled in the event that the request matches a valid ACME HTTP-01 challenge token for the hostname. In that case, Cloudflare has a challenge response to serve back.

Cloudflare customers are protected

As we noted above, Cloudflare has patched this vulnerability and Cloudflare customers do not need to take any action. In addition, we are not aware of any malicious actor abusing this vulnerability.

Moving quickly with vulnerability transparency

As always, we thank the external researchers for responsibly disclosing this vulnerability. We encourage the Cloudflare community to submit any identified vulnerabilities to help us continually improve the security posture of our products and platform. 

We also recognize that the trust you place in us is paramount to the success of your infrastructure on Cloudflare. We consider these vulnerabilities with the utmost concern and will continue to do everything in our power to mitigate impact. We deeply appreciate your continued trust in our platform and remain committed not only to prioritizing security in all we do, but also acting swiftly and transparently whenever an issue does arise. 

Cloudflare's connectivity cloud protects entire corporate networks, helps customers build Internet-scale applications efficiently, accelerates any website or Internet application, wards off DDoS attacks, keeps hackers at bay, and can help you on your journey to Zero Trust.

Visit 1.1.1.1 from any device to get started with our free app that makes your Internet faster and safer.

To learn more about our mission to help build a better Internet, start here. If you're looking for a new career direction, check out our open positions.

VulnerabilitiesWAFSecurityNetwork Services

Related posts

January 16, 2026 2:00 PM

Astro is joining Cloudflare

The Astro Technology Company team — the creators of the Astro web framework — is joining Cloudflare. We’re doubling down on making Astro the best framework for content-driven websites, today and in the years to come....

    By 

January 06, 2026 8:00 AM

A closer look at a BGP anomaly in Venezuela

There has been speculation about the cause of a BGP anomaly observed in Venezuela on January 2. We take a look at BGP route leaks, and dive into what the data suggests caused the anomaly in question....

    By 

文章来源: https://blog.cloudflare.com/acme-path-vulnerability/
如有侵权请联系:admin#unsafe.sh