Cloudflare WAF adds 5 new detection rules including parameter pollution and CVE-2025-59718
New Detections Arriving March 30
Cloudflare is introducing five new WAF rules in a scheduled release on March 30, 2026. These detections expand protection against emerging attack vectors and known vulnerabilities affecting popular platforms.
What's New
The new rules target:
- Parameter Pollution (3 variants): Detection across request bodies, headers (form-encoded), and URIs to identify parameter pollution attacks
- Magento 2 Unrestricted File Upload: Platform-specific protection for the Magento 2 e-commerce system
- Fortinet FortiCloud Authentication Bypass (CVE-2025-59718): Coverage for a critical authentication vulnerability in Fortinet's FortiCloud SSO
Deployment Details
All rules will initially deploy in log mode, meaning they will monitor and report suspicious traffic without blocking it. This gives customers time to review detections in their analytics before transitioning to block mode if needed. The announcement was made on March 23, 2026, providing one week advance notice.
What Developers Need to Do
WAF users should:
- Check their WAF analytics on March 30 to see if any new detections fire
- Review rules in the WAF dashboard to understand detection logic
- Test rules in log mode before enabling block behavior in production
- For Magento 2 or Fortinet customers: prioritize review of the new platform-specific rules