Cloud Armor preconfigured WAF rules overview
Stay organized with collections
Save and categorize content based on your preferences.
Google Cloud Armor preconfigured WAF rules are complex web application firewall (WAF)
rules with dozens of signatures that are compiled from open source industry
standards. Each signature corresponds to an attack detection
rule in the ruleset. Google offers these rules as is. The rules let
Cloud Armor evaluate dozens of distinct traffic signatures by
referring to conveniently named rules rather than requiring you to define
each signature manually.
The following table contains a comprehensive list of preconfigured WAF rules that are
available for use in a Cloud Armor security policy. These rules are
based on the OWASP ModSecurity Core Rule Set (CRS), like OWASP Core Rule Set
4.22
. We recommend using version 4.22 for the most up-to-date protection against
modern threats. Support for CRS 3.3 and 3.0 is ongoing. But, we recommend
avoiding older versions, especially CRS version 3.0, whenever your workloads
allow for the 4.22 rules.
In addition, the following cve-canary rules are available to all
Cloud Armor customers to help detect and optionally block the
following vulnerabilities:
CVE-2021-44228 and CVE-2021-45046 Log4j RCE vulnerabilities
942550-sqli JSON-formatted content vulnerability
google-mrs-v202512-id000001-rce and google-mrs-v202512-id000002-rce React RCE vulnerability
Cloud Armor rule name
Covered vulnerability types
cve-canary
Log4j and React RCE vulnerabilities
json-sqli-canary
JSON-based SQL injection bypass vulnerability
Preconfigured OWASP rules
Each preconfigured WAF rule has a sensitivity level that corresponds to a
OWASP CRS
paranoia level.
A lower sensitivity level indicates a higher confidence signature, which is less
likely to generate a false positive. A higher sensitivity level increases
security, but also increases the risk of generating a false positive. By
default, Cloud Armor runs at sensitivity level 4 and evaluates all
signatures in a rule set once enabled.
SQL injection (SQLi)
The following table provides the signature ID, sensitivity level, and
description of each supported signature in the SQLi preconfigured WAF rule.
You can configure a rule at a particular sensitivity level by using
evaluatePreconfiguredWaf with a preset sensitivity parameter. By
default, without configuring rule set sensitivity, Cloud Armor
evaluates all signatures.
You can configure a rule at a particular sensitivity level by
using evaluatePreconfiguredWaf with a preset sensitivity parameter. By
default, without configuring rule set sensitivity, Cloud Armor
evaluates all signatures.
You can configure a rule at a particular sensitivity level by
using evaluatePreconfiguredWaf with a preset sensitivity parameter. All
signatures for LFI are at sensitivity level 1. The following configuration
works for all sensitivity levels:
You can configure a rule at a particular sensitivity level by
using evaluatePreconfiguredWaf with a preset sensitivity parameter. All
signatures for RCE are at sensitivity level 1. The following configuration works
for all sensitivity levels:
You can configure a rule at a particular sensitivity level by
using evaluatePreconfiguredWaf with a preset sensitivity parameter. By
default, without configuring rule set sensitivity, Cloud Armor
evaluates all signatures.
The following table provides the signature ID, sensitivity level, and
description of each supported signature in the method enforcement preconfigured
rule.
You can configure a rule at a particular sensitivity level by
using evaluatePreconfiguredWaf with a preset sensitivity parameter. By
default, without configuring rule set sensitivity, Cloud Armor
evaluates all signatures.
The following table provides the signature ID, sensitivity level, and
description of each supported signature in the scanner detection preconfigured
rule.
You can configure a rule at a particular sensitivity level by
using evaluatePreconfiguredWaf with a preset sensitivity parameter. By
default, without configuring rule set sensitivity, Cloud Armor
evaluates all signatures.
The following table provides the signature ID, sensitivity level, and
description of each supported signature in the protocol attack preconfigured
rule.
You can configure a rule at a particular sensitivity level by
using evaluatePreconfiguredWaf with a preset sensitivity parameter. By
default, without configuring rule set sensitivity, Cloud Armor
evaluates all signatures.
You can configure a rule at a particular sensitivity level by
using evaluatePreconfiguredWaf with a preset sensitivity parameter. By
default, without configuring rule set sensitivity, Cloud Armor
evaluates all signatures.
The following table provides the signature ID, sensitivity level, and
description of each supported signature in the session fixation preconfigured
rule.
You can configure a rule at a particular sensitivity level by
using evaluatePreconfiguredWaf with a preset sensitivity parameter. All
signatures for session fixation are at sensitivity level 1. The following
configuration works for all sensitivity levels:
You can configure a rule at a particular sensitivity level by
using evaluatePreconfiguredWaf with a preset sensitivity parameter. By
default, without configuring rule set sensitivity, Cloud Armor
evaluates all signatures.
The following table provides the signature ID, sensitivity level, and
description of each supported signature in the generic attack preconfigured
rule.
You can configure a rule at a particular sensitivity level by
using evaluatePreconfiguredWaf with a preset sensitivity parameter. All
signatures for NodeJS attack are at sensitivity level 1. The following
configuration works for other sensitivity levels:
Cloud Armor WAF rules comparison: CRS 3.3 and CRS 4.22
The following table provides the full list of differences between the
Cloud Armor CRS 3.3 and CRS 4.22 rule sets.
The nodejs category from CRS 3.3 was renamed to generic in CRS 4.22, though
they share the same rule ID prefix "934". CRS 4.22 is recommended for modern
threat protection.
Category
OWASP rule
Rule ID
In CRS 3.3
In CRS 4.22
Status
Cross-site scripting (XSS)
xss-v422-stable
941100
Yes
Yes
Both
Cross-site scripting (XSS)
xss-v422-stable
941101
Yes
Yes
Both
Cross-site scripting (XSS)
xss-v422-stable
941110
Yes
Yes
Both
Cross-site scripting (XSS)
xss-v422-stable
941120
Yes
Yes
Both
Cross-site scripting (XSS)
xss-v422-stable
941130
Yes
Yes
Both
Cross-site scripting (XSS)
xss-v422-stable
941140
Yes
Yes
Both
Cross-site scripting (XSS)
xss-v422-stable
941150
Yes
Yes
Both
Cross-site scripting (XSS)
xss-v422-stable
941160
Yes
Yes
Both
Cross-site scripting (XSS)
xss-v422-stable
941170
Yes
Yes
Both
Cross-site scripting (XSS)
xss-v422-stable
941180
Yes
Yes
Both
Cross-site scripting (XSS)
xss-v422-stable
941181
No
Yes
4.22 Only
Cross-site scripting (XSS)
xss-v422-stable
941190
Yes
Yes
Both
Cross-site scripting (XSS)
xss-v422-stable
941200
Yes
Yes
Both
Cross-site scripting (XSS)
xss-v422-stable
941210
Yes
Yes
Both
Cross-site scripting (XSS)
xss-v422-stable
941220
Yes
Yes
Both
Cross-site scripting (XSS)
xss-v422-stable
941230
Yes
Yes
Both
Cross-site scripting (XSS)
xss-v422-stable
941240
Yes
Yes
Both
Cross-site scripting (XSS)
xss-v422-stable
941250
Yes
Yes
Both
Cross-site scripting (XSS)
xss-v422-stable
941260
Yes
Yes
Both
Cross-site scripting (XSS)
xss-v422-stable
941270
Yes
Yes
Both
Cross-site scripting (XSS)
xss-v422-stable
941280
Yes
Yes
Both
Cross-site scripting (XSS)
xss-v422-stable
941290
Yes
Yes
Both
Cross-site scripting (XSS)
xss-v422-stable
941300
Yes
Yes
Both
Cross-site scripting (XSS)
xss-v422-stable
941310
Yes
Yes
Both
Cross-site scripting (XSS)
xss-v422-stable
941320
Yes
Yes
Both
Cross-site scripting (XSS)
xss-v422-stable
941330
Yes
Yes
Both
Cross-site scripting (XSS)
xss-v422-stable
941340
Yes
Yes
Both
Cross-site scripting (XSS)
xss-v422-stable
941350
Yes
Yes
Both
Cross-site scripting (XSS)
xss-v422-stable
941360
Yes
Yes
Both
Cross-site scripting (XSS)
xss-v422-stable
941370
Yes
Yes
Both
Cross-site scripting (XSS)
xss-v422-stable
941380
Yes
Yes
Both
Cross-site scripting (XSS)
xss-v422-stable
941390
No
Yes
4.22 Only
Cross-site scripting (XSS)
xss-v422-stable
941400
No
Yes
4.22 Only
Generic (NodeJS)
generic-v422-stable
934100
Yes
Yes
Both
Generic (NodeJS)
generic-v422-stable
934101
No
Yes
4.22 Only
Generic (NodeJS)
generic-v422-stable
934110
No
Yes
4.22 Only
Generic (NodeJS)
generic-v422-stable
934120
No
Yes
4.22 Only
Generic (NodeJS)
generic-v422-stable
934130
No
Yes
4.22 Only
Generic (NodeJS)
generic-v422-stable
934140
No
Yes
4.22 Only
Generic (NodeJS)
generic-v422-stable
934150
No
Yes
4.22 Only
Generic (NodeJS)
generic-v422-stable
934160
No
Yes
4.22 Only
Generic (NodeJS)
generic-v422-stable
934170
No
Yes
4.22 Only
Generic (NodeJS)
generic-v422-stable
934180
No
Yes
4.22 Only
Java
java-v422-stable
944100
Yes
Yes
Both
Java
java-v422-stable
944110
Yes
Yes
Both
Java
java-v422-stable
944120
Yes
Yes
Both
Java
java-v422-stable
944130
Yes
Yes
Both
Java
java-v422-stable
944140
No
Yes
4.22 Only
Java
java-v422-stable
944150
No
Yes
4.22 Only
Java
java-v422-stable
944151
No
Yes
4.22 Only
Java
java-v422-stable
944152
No
Yes
4.22 Only
Java
java-v422-stable
944200
Yes
Yes
Both
Java
java-v422-stable
944210
Yes
Yes
Both
Java
java-v422-stable
944240
Yes
Yes
Both
Java
java-v422-stable
944250
Yes
Yes
Both
Java
java-v422-stable
944260
No
Yes
4.22 Only
Java
java-v422-stable
944300
Yes
Yes
Both
Local file inclusion (LFI)
lfi-v422-stable
930100
Yes
Yes
Both
Local file inclusion (LFI)
lfi-v422-stable
930110
Yes
Yes
Both
Local file inclusion (LFI)
lfi-v422-stable
930120
Yes
Yes
Both
Local file inclusion (LFI)
lfi-v422-stable
930121
No
Yes
4.22 Only
Local file inclusion (LFI)
lfi-v422-stable
930130
Yes
Yes
Both
Method enforcement
methodenforcement-v422-stable
911100
Yes
Yes
Both
PHP
php-v422-stable
933100
Yes
Yes
Both
PHP
php-v422-stable
933110
Yes
Yes
Both
PHP
php-v422-stable
933111
Yes
Yes
Both
PHP
php-v422-stable
933120
Yes
Yes
Both
PHP
php-v422-stable
933130
Yes
Yes
Both
PHP
php-v422-stable
933131
Yes
Yes
Both
PHP
php-v422-stable
933135
No
Yes
4.22 Only
PHP
php-v422-stable
933140
Yes
Yes
Both
PHP
php-v422-stable
933150
Yes
Yes
Both
PHP
php-v422-stable
933151
Yes
Yes
Both
PHP
php-v422-stable
933152
No
Yes
4.22 Only
PHP
php-v422-stable
933153
No
Yes
4.22 Only
PHP
php-v422-stable
933160
Yes
Yes
Both
PHP
php-v422-stable
933161
Yes
Yes
Both
PHP
php-v422-stable
933170
Yes
Yes
Both
PHP
php-v422-stable
933180
Yes
Yes
Both
PHP
php-v422-stable
933190
Yes
Yes
Both
PHP
php-v422-stable
933200
Yes
Yes
Both
PHP
php-v422-stable
933210
Yes
Yes
Both
PHP
php-v422-stable
933211
No
Yes
4.22 Only
Protocol attack
protocolattack-v422-stable
921110
Yes
Yes
Both
Protocol attack
protocolattack-v422-stable
921120
Yes
Yes
Both
Protocol attack
protocolattack-v422-stable
921130
Yes
Yes
Both
Protocol attack
protocolattack-v422-stable
921140
Yes
Yes
Both
Protocol attack
protocolattack-v422-stable
921150
Yes
Yes
Both
Protocol attack
protocolattack-v422-stable
921151
Yes
Yes
Both
Protocol attack
protocolattack-v422-stable
921160
Yes
Yes
Both
Protocol attack
protocolattack-v422-stable
921170
Yes
Yes
Both
Protocol attack
protocolattack-v422-stable
921190
Yes
Yes
Both
Protocol attack
protocolattack-v422-stable
921200
Yes
Yes
Both
Protocol attack
protocolattack-v422-stable
921210
No
Yes
4.22 Only
Protocol attack
protocolattack-v422-stable
921220
No
Yes
4.22 Only
Protocol attack
protocolattack-v422-stable
921230
No
Yes
4.22 Only
Protocol attack
protocolattack-v422-stable
921240
No
Yes
4.22 Only
Protocol attack
protocolattack-v422-stable
921250
No
Yes
4.22 Only
Protocol attack
protocolattack-v422-stable
921421
No
Yes
4.22 Only
Protocol attack
protocolattack-v422-stable
921422
No
Yes
4.22 Only
Remote code execution (RCE)
rce-v422-stable
932100
Yes
No
3.3 Only
Remote code execution (RCE)
rce-v422-stable
932105
Yes
No
3.3 Only
Remote code execution (RCE)
rce-v422-stable
932106
Yes
No
3.3 Only
Remote code execution (RCE)
rce-v422-stable
932110
Yes
No
3.3 Only
Remote code execution (RCE)
rce-v422-stable
932115
Yes
No
3.3 Only
Remote code execution (RCE)
rce-v422-stable
932120
Yes
Yes
Both
Remote code execution (RCE)
rce-v422-stable
932125
No
Yes
4.22 Only
Remote code execution (RCE)
rce-v422-stable
932130
Yes
Yes
Both
Remote code execution (RCE)
rce-v422-stable
932131
No
Yes
4.22 Only
Remote code execution (RCE)
rce-v422-stable
932140
Yes
Yes
Both
Remote code execution (RCE)
rce-v422-stable
932150
Yes
No
3.3 Only
Remote code execution (RCE)
rce-v422-stable
932160
Yes
Yes
Both
Remote code execution (RCE)
rce-v422-stable
932161
No
Yes
4.22 Only
Remote code execution (RCE)
rce-v422-stable
932170
Yes
Yes
Both
Remote code execution (RCE)
rce-v422-stable
932171
Yes
Yes
Both
Remote code execution (RCE)
rce-v422-stable
932175
No
Yes
4.22 Only
Remote code execution (RCE)
rce-v422-stable
932180
Yes
Yes
Both
Remote code execution (RCE)
rce-v422-stable
932190
Yes
Yes
Both
Remote code execution (RCE)
rce-v422-stable
932200
Yes
Yes
Both
Remote code execution (RCE)
rce-v422-stable
932205
No
Yes
4.22 Only
Remote code execution (RCE)
rce-v422-stable
932206
No
Yes
4.22 Only
Remote code execution (RCE)
rce-v422-stable
932207
No
Yes
4.22 Only
Remote code execution (RCE)
rce-v422-stable
932210
No
Yes
4.22 Only
Remote code execution (RCE)
rce-v422-stable
932220
No
Yes
4.22 Only
Remote code execution (RCE)
rce-v422-stable
932230
No
Yes
4.22 Only
Remote code execution (RCE)
rce-v422-stable
932231
No
Yes
4.22 Only
Remote code execution (RCE)
rce-v422-stable
932232
No
Yes
4.22 Only
Remote code execution (RCE)
rce-v422-stable
932235
No
Yes
4.22 Only
Remote code execution (RCE)
rce-v422-stable
932236
No
Yes
4.22 Only
Remote code execution (RCE)
rce-v422-stable
932237
No
Yes
4.22 Only
Remote code execution (RCE)
rce-v422-stable
932238
No
Yes
4.22 Only
Remote code execution (RCE)
rce-v422-stable
932239
No
Yes
4.22 Only
Remote code execution (RCE)
rce-v422-stable
932240
No
Yes
4.22 Only
Remote code execution (RCE)
rce-v422-stable
932250
No
Yes
4.22 Only
Remote code execution (RCE)
rce-v422-stable
932260
No
Yes
4.22 Only
Remote code execution (RCE)
rce-v422-stable
932270
No
Yes
4.22 Only
Remote code execution (RCE)
rce-v422-stable
932271
No
Yes
4.22 Only
Remote code execution (RCE)
rce-v422-stable
932280
No
Yes
4.22 Only
Remote code execution (RCE)
rce-v422-stable
932281
No
Yes
4.22 Only
Remote code execution (RCE)
rce-v422-stable
932300
No
Yes
4.22 Only
Remote code execution (RCE)
rce-v422-stable
932301
No
Yes
4.22 Only
Remote code execution (RCE)
rce-v422-stable
932310
No
Yes
4.22 Only
Remote code execution (RCE)
rce-v422-stable
932311
No
Yes
4.22 Only
Remote code execution (RCE)
rce-v422-stable
932320
No
Yes
4.22 Only
Remote code execution (RCE)
rce-v422-stable
932321
No
Yes
4.22 Only
Remote code execution (RCE)
rce-v422-stable
932330
No
Yes
4.22 Only
Remote code execution (RCE)
rce-v422-stable
932331
No
Yes
4.22 Only
Remote code execution (RCE)
rce-v422-stable
932370
No
Yes
4.22 Only
Remote code execution (RCE)
rce-v422-stable
932371
No
Yes
4.22 Only
Remote code execution (RCE)
rce-v422-stable
932380
No
Yes
4.22 Only
Remote file inclusion (RFI)
rfi-v422-stable
931100
Yes
Yes
Both
Remote file inclusion (RFI)
rfi-v422-stable
931110
Yes
Yes
Both
Remote file inclusion (RFI)
rfi-v422-stable
931120
Yes
Yes
Both
Remote file inclusion (RFI)
rfi-v422-stable
931130
Yes
Yes
Both
Remote file inclusion (RFI)
rfi-v422-stable
931131
No
Yes
4.22 Only
SQL Injection (SQLi)
sqli-v422-stable
942100
Yes
Yes
Both
SQL Injection (SQLi)
sqli-v422-stable
942101
Yes
Yes
Both
SQL Injection (SQLi)
sqli-v422-stable
942110
Yes
No
3.3 Only
SQL Injection (SQLi)
sqli-v422-stable
942120
Yes
Yes
Both
SQL Injection (SQLi)
sqli-v422-stable
942130
Yes
Yes
Both
SQL Injection (SQLi)
sqli-v422-stable
942131
No
Yes
4.22 Only
SQL Injection (SQLi)
sqli-v422-stable
942140
Yes
Yes
Both
SQL Injection (SQLi)
sqli-v422-stable
942150
Yes
Yes
Both
SQL Injection (SQLi)
sqli-v422-stable
942151
No
Yes
4.22 Only
SQL Injection (SQLi)
sqli-v422-stable
942152
No
Yes
4.22 Only
SQL Injection (SQLi)
sqli-v422-stable
942160
Yes
Yes
Both
SQL Injection (SQLi)
sqli-v422-stable
942170
Yes
Yes
Both
SQL Injection (SQLi)
sqli-v422-stable
942180
Yes
Yes
Both
SQL Injection (SQLi)
sqli-v422-stable
942190
Yes
Yes
Both
SQL Injection (SQLi)
sqli-v422-stable
942200
Yes
Yes
Both
SQL Injection (SQLi)
sqli-v422-stable
942210
Yes
Yes
Both
SQL Injection (SQLi)
sqli-v422-stable
942220
Yes
Yes
Both
SQL Injection (SQLi)
sqli-v422-stable
942230
Yes
Yes
Both
SQL Injection (SQLi)
sqli-v422-stable
942240
Yes
Yes
Both
SQL Injection (SQLi)
sqli-v422-stable
942250
Yes
Yes
Both
SQL Injection (SQLi)
sqli-v422-stable
942251
Yes
Yes
Both
SQL Injection (SQLi)
sqli-v422-stable
942260
Yes
Yes
Both
SQL Injection (SQLi)
sqli-v422-stable
942270
Yes
Yes
Both
SQL Injection (SQLi)
sqli-v422-stable
942280
Yes
Yes
Both
SQL Injection (SQLi)
sqli-v422-stable
942290
Yes
Yes
Both
SQL Injection (SQLi)
sqli-v422-stable
942300
Yes
Yes
Both
SQL Injection (SQLi)
sqli-v422-stable
942310
Yes
Yes
Both
SQL Injection (SQLi)
sqli-v422-stable
942320
Yes
Yes
Both
SQL Injection (SQLi)
sqli-v422-stable
942321
No
Yes
4.22 Only
SQL Injection (SQLi)
sqli-v422-stable
942330
Yes
Yes
Both
SQL Injection (SQLi)
sqli-v422-stable
942340
Yes
Yes
Both
SQL Injection (SQLi)
sqli-v422-stable
942350
Yes
Yes
Both
SQL Injection (SQLi)
sqli-v422-stable
942360
Yes
Yes
Both
SQL Injection (SQLi)
sqli-v422-stable
942361
Yes
Yes
Both
SQL Injection (SQLi)
sqli-v422-stable
942362
No
Yes
4.22 Only
SQL Injection (SQLi)
sqli-v422-stable
942370
Yes
Yes
Both
SQL Injection (SQLi)
sqli-v422-stable
942380
Yes
Yes
Both
SQL Injection (SQLi)
sqli-v422-stable
942390
Yes
Yes
Both
SQL Injection (SQLi)
sqli-v422-stable
942400
Yes
Yes
Both
SQL Injection (SQLi)
sqli-v422-stable
942410
Yes
Yes
Both
SQL Injection (SQLi)
sqli-v422-stable
942420
Yes
Yes
Both
SQL Injection (SQLi)
sqli-v422-stable
942421
Yes
Yes
Both
SQL Injection (SQLi)
sqli-v422-stable
942430
Yes
Yes
Both
SQL Injection (SQLi)
sqli-v422-stable
942431
Yes
Yes
Both
SQL Injection (SQLi)
sqli-v422-stable
942432
Yes
Yes
Both
SQL Injection (SQLi)
sqli-v422-stable
942440
Yes
Yes
Both
SQL Injection (SQLi)
sqli-v422-stable
942450
Yes
Yes
Both
SQL Injection (SQLi)
sqli-v422-stable
942460
Yes
Yes
Both
SQL Injection (SQLi)
sqli-v422-stable
942470
Yes
Yes
Both
SQL Injection (SQLi)
sqli-v422-stable
942480
Yes
Yes
Both
SQL Injection (SQLi)
sqli-v422-stable
942490
Yes
Yes
Both
SQL Injection (SQLi)
sqli-v422-stable
942500
Yes
Yes
Both
SQL Injection (SQLi)
sqli-v422-stable
942510
Yes
Yes
Both
SQL Injection (SQLi)
sqli-v422-stable
942511
Yes
Yes
Both
SQL Injection (SQLi)
sqli-v422-stable
942520
No
Yes
4.22 Only
SQL Injection (SQLi)
sqli-v422-stable
942521
No
Yes
4.22 Only
SQL Injection (SQLi)
sqli-v422-stable
942522
No
Yes
4.22 Only
SQL Injection (SQLi)
sqli-v422-stable
942530
No
Yes
4.22 Only
SQL Injection (SQLi)
sqli-v422-stable
942540
No
Yes
4.22 Only
SQL Injection (SQLi)
sqli-v422-stable
942550
No
Yes
4.22 Only
SQL Injection (SQLi)
sqli-v422-stable
942560
No
Yes
4.22 Only
Scanner detection
scannerdetection-v422-stable
913100
Yes
Yes
Both
Scanner detection
scannerdetection-v422-stable
913101
Yes
No
3.3 Only
Scanner detection
scannerdetection-v422-stable
913102
Yes
No
3.3 Only
Scanner detection
scannerdetection-v422-stable
913110
Yes
No
3.3 Only
Scanner detection
scannerdetection-v422-stable
913120
Yes
No
3.3 Only
Session fixation
sessionfixation-v422-stable
943100
Yes
Yes
Both
Session fixation
sessionfixation-v422-stable
943110
Yes
Yes
Both
Session fixation
sessionfixation-v422-stable
943120
Yes
Yes
Both
CVEs and other vulnerabilities
The following table provides the signature ID, sensitivity level, and
description of each supported signature in the React RCE vulnerability rule to
help detect and mitigate CVE-2025-55182.
Signature ID (Rule ID)
Sensitivity level
Description
google-mrs-v202512-id000001-rce
0
React RCE vulnerability to help detect and mitigate CVE-2025-55182
google-mrs-v202512-id000002-rce
0
React RCE vulnerability to help detect and mitigate CVE-2025-55182
Use the following expression to help detect and mitigate CVE-2025-55182:
The following table provides the signature ID, sensitivity level, and
description of each supported signature in the CVE Log4j RCE vulnerability
preconfigured rule.
Signature ID (Rule ID)
Sensitivity level
Description
owasp-crs-v030001-id044228-cve
1
Base rule to help detect exploit attempts of CVE-2021-44228
& CVE-2021-45046
owasp-crs-v030001-id144228-cve
1
Google-provided enhancements to cover more bypass and obfuscation attempts
owasp-crs-v030001-id244228-cve
3
Increased sensitivity of detection to target even more bypass and
obfuscation attempts, with nominal increase in risk of false positive detection
owasp-crs-v030001-id344228-cve
3
Increased sensitivity of detection to target even more bypass and
obfuscation attempts using base64 encoding, with nominal increase in risk of false positive detection
You can configure a rule at a particular sensitivity level by
using evaluatePreconfiguredWaf with a preset sensitivity parameter. By
default, without configuring rule set sensitivity, Cloud Armor
evaluates all signatures.
The following table provides the signature ID, sensitivity level, and
description of the supported signature
942550-sqli,
which covers the vulnerability in which malicious attackers can
bypass WAF by appending JSON syntax to SQL injection payloads.
Signature ID (Rule ID)
Sensitivity level
Description
owasp-crs-id942550-sqli
2
Detects all JSON-based SQLi vectors, including SQLi signatures
found in the URL
Use the following expression to deploy the signature:
We recommend that you also enable sqli-v33-stable at sensitivity level 2 to
fully address JSON-based SQL injection bypasses.
Limitations
Cloud Armor preconfigured WAF rules have the following limitations:
WAF rule changes typically take several minutes to propagate.
Among the HTTP request types with a request body, Cloud Armor
processes only requests with a body. Cloud Armor evaluates preconfigured
rules against the first 64 KB of request body content. For more information, see
Request body inspection limitation.
When JSON parsing is enabled, Cloud Armor can parse and apply
preconfigured WAF rules to JSON-formatted content. For more information, see
Request body content parsing.
If you exclude request fields from inspection
for a preconfigured WAF rule to reduce false positives, you can't use the allow action with that
rule. Request fields that are explicitly excluded from inspection are automatically allowed.
Cloud Armor preconfigured WAF rules can only be used with backend services
behind a load balancer. Therefore, load balancing quotas and limits apply to
your deployment. For more information, see the load balancing
quotas.
[[["Easy to understand","easyToUnderstand","thumb-up"],["Solved my problem","solvedMyProblem","thumb-up"],["Other","otherUp","thumb-up"]],[["Hard to understand","hardToUnderstand","thumb-down"],["Incorrect information or sample code","incorrectInformationOrSampleCode","thumb-down"],["Missing the information/samples I need","missingTheInformationSamplesINeed","thumb-down"],["Other","otherDown","thumb-down"]],["Last updated 2026-05-08 UTC."],[],[]]