This article is a comprehensive post-mortem report from Cloudflare regarding a 25-minute service outage on December 5, 2025. The incident, which impacted approximately 28% of Cloudflare's HTTP traffic, was not a cyberattack but rather an unintended consequence of internal configuration changes. Cloudflare was attempting to increase WAF buffer size to 1MB to protect customers against a critical React Server Components vulnerability (CVE-2025-55182). During this rollout, an internal WAF testing tool was disabled via a global configuration system. This disabling, specifically when a killswitch was applied to a rule with an 'execute' action, exposed a previously undetected Lua runtime error (attempt to index field 'execute' (a nil value)) in the FL1 proxy version. This error resulted in HTTP 500 responses for customers using the FL1 proxy with Cloudflare Managed Rulesets. The issue was quickly identified and resolved by reverting the change. The article acknowledges a similar prior incident on November 18 and outlines ongoing resilience projects, including enhanced rollouts, streamlined break-glass capabilities, and 'fail-open' error handling, which were unfortunately not yet fully deployed.



