PT-2025-12427 · Next.Js · Next.Js
Cold-Try
·
Published
2025-03-21
·
Updated
2026-03-17
·
CVE-2025-29927
CVSS v2.0
9.4
Critical
| AV:N/AC:L/Au:N/C:C/I:C/A:N |
Name of the Vulnerable Software and Affected Versions
Next.js versions 11.1.4 through 15.2.2
Description
Next.js is susceptible to an authorization bypass vulnerability (CVE-2025-29927) with a CVSS score of 9.1. This flaw allows attackers to bypass middleware authorization checks by manipulating the
x-middleware-subrequest header. Exploitation can lead to unauthorized access to protected resources. The vulnerability affects versions 11.1.4 through 15.2.2. Numerous reports indicate active exploitation of this vulnerability. A PoC exploit is publicly available. The vulnerability stems from improper trust of the internal x-middleware-subrequest header. Vercel-hosted applications are automatically protected.Recommendations
Update Next.js to version 15.2.3 or later, or 14.2.25 or later, or 13.5.9 or later, or 12.3.5 or later. If patching is not immediately possible, implement a workaround by blocking requests containing the
x-middleware-subrequest header at the web server or proxy level.Exploit
Fix
DoS
RCE
Incorrect Authorization
Improper Authorization
Found an issue in the description? Have something to add? Feel free to write us 👾
Related Identifiers
Affected Products
Next.Js