PT-2024-25808 · Next.Js · Next.Js

Adam Kues

+1

·

Published

2024-05-09

·

Updated

2026-03-27

·

CVE-2024-34351

CVSS v3.1

7.5

High

AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Name of the Vulnerable Software and Affected Versions Next.js versions prior to 14.1.1
Description A Server-Side Request Forgery (SSRF) vulnerability was identified in Next.js Server Actions. If the Host header is modified, and certain conditions are met, an attacker may be able to make requests that appear to be originating from the Next.js application server itself. The required conditions are 1) Next.js is running in a self-hosted manner; 2) the Next.js application makes use of Server Actions; and 3) the Server Action performs a redirect to a relative path which starts with a /. It is estimated that over 3.1 million services are potentially affected.
Recommendations For Next.js versions prior to 14.1.1, upgrade to Next.js version 14.1.1 to resolve the issue. As a temporary workaround, consider restricting access to Server Actions or disabling the use of relative paths starting with / in Server Actions until a patch is applied. Additionally, be cautious when modifying the Host header to prevent potential SSRF attacks.

Exploit

Fix

SSRF

Weakness Enumeration

Related Identifiers

CVE-2024-34351
GHSA-FR5H-RQP8-MJ6G
GHSA-VJ2P-7PGW-G2WF

Affected Products

Next.Js