CVE-2025-29927
21.03.2025, 15:15
Next.js is a React framework for building full-stack web applications. Starting in version 1.11.4 and prior to versions 12.3.5, 13.5.9, 14.2.25, and 15.2.3, it is possible to bypass authorization checks within a Next.js application, if the authorization check occurs in middleware. If patching to a safe version is infeasible, it is recommend that you prevent external user requests which contain the x-middleware-subrequest header from reaching your Next.js application. This vulnerability is fixed in 12.3.5, 13.5.9, 14.2.25, and 15.2.3.Enginsight
Vendor | Product | Version |
---|---|---|
vercel | next.js | 11.1.4 ≤ 𝑥 < 12.3.5 |
vercel | next.js | 13.0.0 ≤ 𝑥 < 13.5.9 |
vercel | next.js | 14.0.0 ≤ 𝑥 < 14.2.25 |
vercel | next.js | 15.0.0 ≤ 𝑥 < 15.2.3 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
- CWE-285 - Improper AuthorizationThe software does not perform or incorrectly performs an authorization check when an actor attempts to access a resource or perform an action.
- CWE-863 - Incorrect AuthorizationThe software performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check. This allows attackers to bypass intended access restrictions.
References