BotBeat
...
← Back

> ▌

CloudflareCloudflare
RESEARCHCloudflare2026-04-08

Security Researcher Demonstrates Chain of Self-XSS and CSRF Vulnerabilities in Cloudflare Access

Key Takeaways

  • ▸Three individually low-severity vulnerabilities (Self-XSS, Cookie Tossing, CSRF token weakness) can be chained into a critical bypass of Cloudflare Access approval mechanisms
  • ▸The attack demonstrates how 'informative' triaged bugs can become significant security issues when combined in creative ways
  • ▸Both the CF_Authorization cookie and CSRF token protections can be simultaneously undermined through the vulnerability chain
Source:
Hacker Newshttps://kazama.in/self-xss-to-cloudflare-single-click-approvals/↗

Summary

A security researcher has documented a sophisticated vulnerability chain affecting Cloudflare Access's Temporary Auth approval mechanism. The attack combines three individually low-severity bugs—a Self-XSS on the SAML SSO endpoint, cookie tossing vulnerability on the *.cloudflareaccess.com domain, and a predictable CSRF token—to achieve a single-click bypass of the access request approval flow. The vulnerabilities were reported through HackerOne to Cloudflare's security team.

The attack exploits the authentication and CSRF protection mechanisms that guard Cloudflare's Temporary Auth feature, which enforces approval-based access to protected applications. By chaining the three bugs together, an attacker can forge unauthorized access approvals without legitimate authorization. The researcher notes that after an initial fix was deployed, a second Self-XSS variant was discovered in Cloudflare's Browser Isolation feature, allowing the entire attack chain to be replayed, demonstrating the systemic nature of the vulnerability class.

  • A second variant in Browser Isolation suggests broader validation issues across Cloudflare's security infrastructure

Editorial Opinion

This disclosure highlights a critical lesson in vulnerability assessment: individually dismissing bugs as 'informative' or 'self-XSS' can obscure systemic security weaknesses when those bugs are carefully combined. The researcher's persistence in finding a chain after the initial fix—and discovering a second variant—suggests that organizations need to adopt more holistic security reviews that consider how low-impact vulnerabilities might interact. This case demonstrates why comprehensive security audits matter as much as individual bug fixes.

CybersecurityEthics & BiasAI Safety & Alignment

More from Cloudflare

CloudflareCloudflare
PRODUCT LAUNCH

Cloudflare Rebuilds Next.js Framework in One Week Using AI for $1,100

2026-04-09
CloudflareCloudflare
RESEARCH

Cloudflare Rethinking Cache Architecture for AI-Driven Traffic Era

2026-04-02
CloudflareCloudflare
PRODUCT LAUNCH

Cloudflare's Workers AI Enters Large Model Inference Market With Moonshot AI's Kimi K2.5

2026-04-02

Comments

Suggested

BittensorBittensor
FUNDING & BUSINESS

Covenant AI Exits Bittensor Over Centralization Concerns; TAO Token Plummets 15%

2026-04-10
MythosMythos
POLICY & REGULATION

Treasury Secretary and Federal Reserve Chair Meet with Bank CEOs Over AI Model Risks

2026-04-10
OracleOracle
POLICY & REGULATION

OpenJDK Bans AI-Generated Code Contributions, Allows Private Use for Analysis

2026-04-10
← Back to news
© 2026 BotBeat
AboutPrivacy PolicyTerms of ServiceContact Us