Modified WAF Objects: [total: 1] ================================== Policy: name: 'CVE-2025-47577: WordPress TI WooCommerce Wishlist - File Upload' id: '20000303' minimum version: '10.0' predicates: - type: Signatures operation: At Least One values: - '708380' - type: HTTP Request operation: Match All match values: - part: header name: Content-Type operation: includes value: multipart/form-data - type: HTTP Request Method operation: At Least One values: - POST New WAF Objects: [total: 2] ================================== Signature: ID: '708380' Name: 'CVE-2025-47577: WordPress TI WooCommerce Wishlist - File Upload - Detection' Attack: Illegal Resource Access - Detection Attack Class: Illegal Resource Access Dictionary: Recommended for Detection for Web Applications Pattern: part="file", part="tinv_wishlist_id", part="tinv_wishlist_name", part="product_id" Policy: Recommended Signatures Policy for Web Applications Search In: - parameters Signature: ID: '708379' Name: 'CVE-2025-5777: Citrix NetScaler - Unauthenticated Memory Disclosure and Session Hijack' Attack: Illegal Resource Access - Blocking Attack Class: Illegal Resource Access Dictionary: Recommended for Blocking for Web Applications Pattern: part="/p/u/doAuthentication.do", rgxp="\blogin\b(?!\s?=)" Policy: Recommended Signatures Policy for Web Applications Search In: - url-and-parameters