Project

General

Profile

Actions

BUG #4385

open

[SQA] Origin IP Exposure (No Cloudflare Protection)

Added by Tasfia Zaima 1 day ago. Updated 1 day ago.

Status:
Pending
Priority:
Urgent
Target version:
Start date:
04/08/2026
Due date:
% Done:

0%

Estimated time:

Description

Description:
The origin server IP for aiaxio.com is publicly exposed. Analysis via Censys revealed the actual origin IP, and further verification using Wappalyzer confirms there is no Cloudflare protection on the origin.
This allows attackers to bypass CDN/WAF protections and interact directly with the backend server.

Steps to Reproduce:

  1. Use Censys to discover the origin IP of aiaxio.com.
  2. Verify the IP using Wappalyzer or similar tools – no Cloudflare headers are present.
  3. Access the origin IP directly:
    curl http:// -H "Host: aiaxio.com"
  4. Observe that the server responds successfully.

Actual Result:
Origin IP responds directly; no Cloudflare or WAF protection is in place.

Expected Result:
All traffic should route through Cloudflare. Direct access to the origin IP should be blocked.

Impact:

  • Bypasses CDN/WAF protections
  • Exposes backend to direct attacks (DDoS, brute force, exploit attempts)
  • Increases attack surface

Proof of Concept:
PoC

Actions

Also available in: Atom PDF