Cloudflare's DMARC Documentation Exposed an Unregistered Domain And Dozens of Organizations Paid the Price

March 27, 2026

Cloudflare's DMARC documentation referenced an unregistered domain as an example RUA address. Organizations that copied the record verbatim into their DNS zones unknowingly routed their DMARC aggregate reports to whoever held that domain. We registered it - and the reports started coming in immediately.

Cloudflare's DMARC Documentation Exposed an Unregistered Domain And Dozens of Organizations Paid the Price

Cloudflare included a publicly available domain in their technical documentation, which has led dozens of organizations to implement the suggested DNS record in their DNS zones without understanding the risks.

Rather than using an IANA-reserved example[.]com to illustrate DMARC deployment logic, the documentation references third-party-example[.]com.

This domain has never been registered (until we did), meaning any party could acquire it and gain access to infrastructure data from organizations that relied on the documentation.

I see two primary concerns:

1. The documentation does not clearly indicate that the domain must be replaced prior to production deployment.
2. The example domain is neither controlled by Cloudflare nor reserved by IANA, creating an unnecessary security exposure.

I initially considered reporting this to Cloudflare, but their vulnerability disclosure program on HackerOne explicitly classifies this type of issue as out of scope.

As long as organizations treat DMARC as a copy/paste configuration rather than a security control, exposures, data leakage, and abuse opportunities for threat actors will remain inevitable.

Related posts
All posts
Coordinated Subdomain Takeover Campaign Targeting US Universities

Attackers are hijacking abandoned .edu subdomains via orphaned CNAME records, serving spam under trusted university domains and exploiting SEO authority.

Coordinated Subdomain Takeover Campaign Targeting US Universities
Cloudflare's DMARC Documentation Exposed an Unregistered Domain And Dozens of Organizations Paid the Price

How an unregistered domain in Cloudflare's DMARC documentation silently exposed infrastructure data from dozens of organizations.

Cloudflare's DMARC Documentation Exposed an Unregistered Domain And Dozens of Organizations Paid the Price
FinTech AccessPay Exposed Internal Email Infrastructure Data for Years

A misconfigured DMARC record sent sensitive email infrastructure data to an unregistered domain, creating a long-term exposure risk.

FinTech AccessPay Exposed Internal Email Infrastructure Data for Years