Cloudflare CDN flaw could expose user location simply by sending an image

Location Data
(Image credit: Shutterstock / Illus_man)

  • A security researcher discovered a way to abuse how Cloudflare cached certain images
  • The method could allow outsiders to partially de-anonymize people
  • The bug was quickly fixed, Cloudflare assures users

Experts have found a way to partially de-anonymize a person and find out their general location by simply sending them a picture on certain messaging platforms.

This is according to a 15-year-old cybersecurity researcher named Daniel, who recently found a vulnerability in Cloudflare’s content delivery network (CDN).

In theory, the vulnerability is simple. Cloudflare wants people to receive their messages, and multimedia, as quickly as possible. For that reason, images that are being sent go through a data center that’s nearest to the recipient. If the attacker could learn which data center that is, they could get a solid picture of their target’s location.

A 200-mile radius

“One of Cloudflare's most used feature is Caching. Cloudflare's Cache stores copies of frequently accessed content (such as images, videos, or webpages) in its datacenters, reducing server load and improving website performance,” Daniel explained.

“When your device sends a request for a resource that can be cached, Cloudflare retrieves the resource from its local datacenter storage, if available. Otherwise, it fetches the resource from the origin server, caches it locally, and then returns it. By default, some file extensions are automatically cached but site operators can also configure new cache rules.”

“If you live in a developed country, there's a good chance the nearest datacenter to you is less than 200 miles from you.” Since some apps, like Signal, or Discord, show the image’s thumbnail in the notification, it makes this a zero-click vulnerability.

Daniel further explained Cloudflare returns information about a request’s cache status in the HTTP response, including the airport code for the closest airport to the data center.

Next, he used a bug in Cloudflare Workers, and used a tool called Cloudflare Teleport, forcing requests through a specific data center.

A few months after the bug was discovered, Cloudflare patched it up, telling BleepingComputer it was disclosed in December 2024, and “immediately resolved.”

“The ability to make requests to specific data centres via the "Cloudflare Teleport" project on GitHub was quickly addressed – as the security researcher mentions in their disclosure. We believe bug bounties are a vital part of every security team’s toolbox, and continue to encourage third parties and researchers to continue to report this type of activity for review by our team."

You might also like

Sead is a seasoned freelance journalist based in Sarajevo, Bosnia and Herzegovina. He writes about IT (cloud, IoT, 5G, VPN) and cybersecurity (ransomware, data breaches, laws and regulations). In his career, spanning more than a decade, he’s written for numerous media outlets, including Al Jazeera Balkans. He’s also held several modules on content writing for Represent Communications.

You must confirm your public display name before commenting

Please logout and then login again, you will then be prompted to enter your display name.

Read more
the YouTube logo on a screen in front of other YouTube logos covering a black background
Worrying YouTube security flaw exposed billions of user emails
A digital themed isometric showing a neon padlock in the foreground, and a technological diagram of a processor logic board in the background.
A top online gift card store may have exposed private data on hundreds of thousands of users
Password
Millions of airline customers possibly affected by OAuth security flaw
A hacker wearing a hoodie sitting at a computer, his face hidden.
Experts warn this critical PHP vulnerability could be set to become a global problem
A photographer taking a photograph at the camera.
Cloudflare's new tool wants to help you spot doctored images online
Laptop computer displaying logo of WordPress, a free and open-source content management system (CMS)
Over a million WordPress sites exposed to attack from W3 Total Cache plugin flaw
Latest in Security
Hacker silhouette working on a laptop with North Korean flag on the background
North Korea unveils new military unit targeting AI attacks
An image of network security icons for a network encircling a digital blue earth.
US government warns agencies to make sure their backups are safe from NAKIVO security issue
Laptop computer displaying logo of WordPress, a free and open-source content management system (CMS)
This top WordPress plugin could be hiding a worrying security flaw, so be on your guard
Computer Hacked, System Error, Virus, Cyber attack, Malware Concept. Danger Symbol
Veeam urges users to patch security issues which could allow backup hacks
UK Prime Minister Sir Kier Starmer
The UK releases timeline for migration to post-quantum cryptography
Representational image depecting cybersecurity protection
Cisco smart licensing system sees critical security flaws exploited
Latest in News
Ray-Ban Meta Smart Glasses
Samsung's rumored smart specs may be launching before the end of 2025
Apple iPhone 16 Review
The latest iPhone 18 leak hints at a major chipset upgrade for all four models
Quordle on a smartphone held in a hand
Quordle hints and answers for Monday, March 24 (game #1155)
NYT Strands homescreen on a mobile phone screen, on a light blue background
NYT Strands hints and answers for Monday, March 24 (game #386)
NYT Connections homescreen on a phone, on a purple background
NYT Connections hints and answers for Monday, March 24 (game #652)
Quordle on a smartphone held in a hand
Quordle hints and answers for Sunday, March 23 (game #1154)