Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
69 changes: 69 additions & 0 deletions src/content/changelog/waf/2026-03-02-waf-release.mdx
Original file line number Diff line number Diff line change
@@ -0,0 +1,69 @@
---
title: "WAF Release - 2026-03-02"
description: Cloudflare WAF managed rulesets 2026-03-02 release
date: 2026-03-02
---

import { RuleID } from "~/components";

This week's release introduces new detections for vulnerabilities in SmarterTools SmarterMail (CVE-2025-52691 and CVE-2026-23760), alongside improvements to an existing Command Injection (nslookup) detection to enhance coverage.


**Key Findings**

- CVE-2025-52691: SmarterTools SmarterMail mail server is vulnerable to Arbitrary File Upload, allowing an unauthenticated attacker to upload files to any location on the mail server, potentially enabling remote code execution.
- CVE-2026-23760: SmarterTools SmarterMail versions prior to build 9511 contain an authentication bypass vulnerability in the password reset API permitting unaunthenticated to reset system administrator accounts failing to verify existing password or reset token.

**Impact**

Successful exploitation of these SmarterMail vulnerabilities could lead to full system compromise or unauthorized administrative access to mail servers. Administrators are strongly encouraged to apply vendor patches without delay.

<table style="width: 100%">
<thead>
<tr>
<th>Ruleset</th>
<th>Rule ID</th>
<th>Legacy Rule ID</th>
<th>Description</th>
<th>Previous Action</th>
<th>New Action</th>
<th>Comments</th>
</tr>
</thead>
<tbody>
<tr>
<td>Cloudflare Managed Ruleset</td>
<td>
<RuleID id="0f282f3c89614779966faf52966ec6b1" />
</td>
<td>N/A</td>
<td>SmarterMail - Arbitrary File Upload - CVE-2025-52691</td>
<td>Log</td>
<td>Block</td>
<td>This is a new detection.</td>
</tr>
<tr>
<td>Cloudflare Managed Ruleset</td>
<td>
<RuleID id="35978af68e374a059e397bf5ee964a8c" />
</td>
<td>N/A</td>
<td>SmarterMail - Authentication Bypass - CVE-2026-23760</td>
<td>Log</td>
<td>Block</td>
<td>This is a new detection.</td>
</tr>
<tr>
<td>Cloudflare Managed Ruleset</td>
<td>
<RuleID id="4bb099bcd71141d4a35c1aa675b64d99" />
</td>
<td>N/A</td>
<td>Command Injection - Nslookup - Beta</td>
<td>Log</td>
<td>Block</td>
<td>This rule is merged into the original rule "Command Injection - Nslookup" (ID: <RuleID id="f4a310393c564d50bd585601b090ba9a" />)</td>
</tr>

</tbody>
</table>
34 changes: 6 additions & 28 deletions src/content/changelog/waf/scheduled-waf-release.mdx
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
---
title: WAF Release - Scheduled changes for 2026-03-02
description: WAF managed ruleset changes scheduled for 2026-03-02
date: 2026-02-25
title: WAF Release - Scheduled changes for 2026-03-09
description: WAF managed ruleset changes scheduled for 2026-03-09
date: 2026-03-02
scheduled: true
---

Expand All @@ -21,37 +21,15 @@ import { RuleID } from "~/components";
</thead>
<tbody>
<tr>
<td>2026-02-25</td>
<td>2026-03-02</td>
<td>2026-03-09</td>
<td>Log</td>
<td>N/A</td>
<td>
<RuleID id="0f282f3c89614779966faf52966ec6b1" />
<RuleID id="5ae86a9bda0c41dbb905132f796ea2f6" />
</td>
<td>SmarterMail - Arbitrary File Upload - CVE-2025-52691</td>
<td>Ivanti EPMM - Code Injection - CVE:CVE-2026-1281 CVE:CVE-2026-1340</td>
<td>This is a new detection. </td>
</tr>
<tr>
<td>2026-02-25</td>
<td>2026-03-02</td>
<td>Log</td>
<td>N/A</td>
<td>
<RuleID id="35978af68e374a059e397bf5ee964a8c" />
</td>
<td>SmarterMail - Authentication Bypass - CVE-2026-23760</td>
<td>This is a new detection.</td>
</tr>
<tr>
<td>2026-02-25</td>
<td>2026-03-02</td>
<td>Log</td>
<td>N/A</td>
<td>
<RuleID id="4bb099bcd71141d4a35c1aa675b64d99" />
</td>
<td>Command Injection - Nslookup - Beta</td>
<td>This rule will be merged into the original rule "Command Injection - Nslookup" (ID: <RuleID id="f4a310393c564d50bd585601b090ba9a" />)</td>
</tr>
</tbody>
</table>
Loading