Next.js is a React framework for building full-stack web applications. Starting in version 1.11.4 and prior to versions 12.3.5, 13.5.9, 14.2.25, and 15.2.3, it is possible to bypass authorization checks within a Next.js application, if the authorization check occurs in middleware. If patching to a safe version is infeasible, it is recommend that you prevent external user requests which contain the x-middleware-subrequest header from reaching your Next.js application. This vulnerability is fixed in 12.3.5, 13.5.9, 14.2.25, and 15.2.3.
References
Configurations
No configuration.
History
08 Apr 2025, 14:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Summary | (en) Next.js is a React framework for building full-stack web applications. Starting in version 1.11.4 and prior to versions 12.3.5, 13.5.9, 14.2.25, and 15.2.3, it is possible to bypass authorization checks within a Next.js application, if the authorization check occurs in middleware. If patching to a safe version is infeasible, it is recommend that you prevent external user requests which contain the x-middleware-subrequest header from reaching your Next.js application. This vulnerability is fixed in 12.3.5, 13.5.9, 14.2.25, and 15.2.3. |
28 Mar 2025, 15:15
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
References |
|
23 Mar 2025, 22:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
21 Mar 2025, 15:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-03-21 15:15
Updated : 2025-04-08 14:15
NVD link : CVE-2025-29927
Mitre link : CVE-2025-29927
CVE.ORG link : CVE-2025-29927
JSON object : View
Products Affected
No product.
CWE
CWE-285
Improper Authorization