Skip to content

Conversation

LeonMelis
Copy link

@LeonMelis LeonMelis commented Sep 26, 2025

Description

CloudFlare's proxy services are known to inject CF-Connecting-IP header in the request, which contains the real IP address of the requester. This header seems to have similar functionality as X-Forwarded-For and/or X-Real-IP.

As with X-Real-IP and X-Forwarded-For, the IP-address contained in the CF-Connecting-IP header is considered PII and should be scrubbed by default.

See also: https://developers.cloudflare.com/fundamentals/reference/http-headers/


Note

Adds CF-Connecting-IP to DEFAULT_SENSITIVE_HEADERS so it’s sanitized by default when PII sending is disabled.

  • Request integration:
    • Add CF-Connecting-IP to DEFAULT_SENSITIVE_HEADERS in src/Integration/RequestIntegration.php to sanitize this header by default when PII is disabled.

Written by Cursor Bugbot for commit 5213bfa. This will update automatically on new commits. Configure here.

LeonMelis and others added 2 commits September 26, 2025 13:33
CloudFlare's proxy services are known to inject 'CF-Connecting-IP' header in the request, which contains the real IP address of the requester. This header seems to have similar functionality as 'X-Forwarded-For' and/or 'X-Real-IP'. 

As with X-Real-IP and X-Forwarded-For, the IP-address contained in the header is considered PII and should be scrubbed by default. 

See also: https://developers.cloudflare.com/fundamentals/reference/http-headers/
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants