Lookup for vulnerable packages by Package URL.
| Purl | pkg:npm/next@7.0.1-canary.0 |
| Type | npm |
| Namespace | |
| Name | next |
| Version | 7.0.1-canary.0 |
| Qualifiers |
|
| Subpath | |
| Is_vulnerable | true |
| Next_non_vulnerable_version | 15.5.14 |
| Latest_non_vulnerable_version | 16.2.3 |
| Affected_by_vulnerabilities |
| 0 |
| url |
VCID-54qu-9bx2-9ka8 |
| vulnerability_id |
VCID-54qu-9bx2-9ka8 |
| summary |
Next.js Improper Middleware Redirect Handling Leads to SSRF
A vulnerability in **Next.js Middleware** has been fixed in **v14.2.32** and **v15.4.7**. The issue occurred when request headers were directly passed into `NextResponse.next()`. In self-hosted applications, this could allow Server-Side Request Forgery (SSRF) if certain sensitive headers from the incoming request were reflected back into the response.
All users implementing custom middleware logic in self-hosted environments are strongly encouraged to upgrade and verify correct usage of the `next()` function.
More details at [Vercel Changelog](https://vercel.com/changelog/cve-2025-57822) |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-57822 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.05626 |
| scoring_system |
epss |
| scoring_elements |
0.90333 |
| published_at |
2026-04-08T12:55:00Z |
|
| 1 |
| value |
0.05626 |
| scoring_system |
epss |
| scoring_elements |
0.90348 |
| published_at |
2026-04-12T12:55:00Z |
|
| 2 |
| value |
0.05626 |
| scoring_system |
epss |
| scoring_elements |
0.9034 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.05626 |
| scoring_system |
epss |
| scoring_elements |
0.90302 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.05626 |
| scoring_system |
epss |
| scoring_elements |
0.90319 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.05626 |
| scoring_system |
epss |
| scoring_elements |
0.90357 |
| published_at |
2026-04-18T12:55:00Z |
|
| 6 |
| value |
0.05626 |
| scoring_system |
epss |
| scoring_elements |
0.90341 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.05626 |
| scoring_system |
epss |
| scoring_elements |
0.90314 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.06479 |
| scoring_system |
epss |
| scoring_elements |
0.9112 |
| published_at |
2026-04-29T12:55:00Z |
|
| 9 |
| value |
0.06479 |
| scoring_system |
epss |
| scoring_elements |
0.91125 |
| published_at |
2026-04-26T12:55:00Z |
|
| 10 |
| value |
0.06479 |
| scoring_system |
epss |
| scoring_elements |
0.91127 |
| published_at |
2026-04-24T12:55:00Z |
|
| 11 |
| value |
0.06479 |
| scoring_system |
epss |
| scoring_elements |
0.91113 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-57822 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-57822, GHSA-4342-x723-ch2f
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-54qu-9bx2-9ka8 |
|
| 1 |
| url |
VCID-dcke-zkg7-tfb5 |
| vulnerability_id |
VCID-dcke-zkg7-tfb5 |
| summary |
Cross-site Scripting
Next.js suffers from XSS via the /_error pages. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-18282 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00257 |
| scoring_system |
epss |
| scoring_elements |
0.49047 |
| published_at |
2026-04-29T12:55:00Z |
|
| 1 |
| value |
0.00257 |
| scoring_system |
epss |
| scoring_elements |
0.49088 |
| published_at |
2026-04-09T12:55:00Z |
|
| 2 |
| value |
0.00257 |
| scoring_system |
epss |
| scoring_elements |
0.49106 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.00257 |
| scoring_system |
epss |
| scoring_elements |
0.49079 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.00257 |
| scoring_system |
epss |
| scoring_elements |
0.49085 |
| published_at |
2026-04-13T12:55:00Z |
|
| 5 |
| value |
0.00257 |
| scoring_system |
epss |
| scoring_elements |
0.4913 |
| published_at |
2026-04-16T12:55:00Z |
|
| 6 |
| value |
0.00257 |
| scoring_system |
epss |
| scoring_elements |
0.49128 |
| published_at |
2026-04-18T12:55:00Z |
|
| 7 |
| value |
0.00257 |
| scoring_system |
epss |
| scoring_elements |
0.49096 |
| published_at |
2026-04-21T12:55:00Z |
|
| 8 |
| value |
0.00257 |
| scoring_system |
epss |
| scoring_elements |
0.49081 |
| published_at |
2026-04-24T12:55:00Z |
|
| 9 |
| value |
0.00257 |
| scoring_system |
epss |
| scoring_elements |
0.49091 |
| published_at |
2026-04-26T12:55:00Z |
|
| 10 |
| value |
0.00257 |
| scoring_system |
epss |
| scoring_elements |
0.49021 |
| published_at |
2026-04-01T12:55:00Z |
|
| 11 |
| value |
0.00257 |
| scoring_system |
epss |
| scoring_elements |
0.49056 |
| published_at |
2026-04-02T12:55:00Z |
|
| 12 |
| value |
0.00257 |
| scoring_system |
epss |
| scoring_elements |
0.49084 |
| published_at |
2026-04-04T12:55:00Z |
|
| 13 |
| value |
0.00257 |
| scoring_system |
epss |
| scoring_elements |
0.49038 |
| published_at |
2026-04-07T12:55:00Z |
|
| 14 |
| value |
0.00257 |
| scoring_system |
epss |
| scoring_elements |
0.49092 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-18282 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-18282, GHSA-qw96-mm2g-c8m7
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-dcke-zkg7-tfb5 |
|
| 2 |
| url |
VCID-r4pw-m8mz-xbdq |
| vulnerability_id |
VCID-r4pw-m8mz-xbdq |
| summary |
Next.js Affected by Cache Key Confusion for Image Optimization API Routes
A vulnerability in Next.js Image Optimization has been fixed in v15.4.5 and v14.2.31. When images returned from API routes vary based on request headers (such as `Cookie` or `Authorization`), these responses could be incorrectly cached and served to unauthorized users due to a cache key confusion bug.
All users are encouraged to upgrade if they use API routes to serve images that depend on request headers and have image optimization enabled.
More details at [Vercel Changelog](https://vercel.com/changelog/cve-2025-57752) |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-57752 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19278 |
| published_at |
2026-04-29T12:55:00Z |
|
| 1 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19318 |
| published_at |
2026-04-26T12:55:00Z |
|
| 2 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19327 |
| published_at |
2026-04-24T12:55:00Z |
|
| 3 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19434 |
| published_at |
2026-04-21T12:55:00Z |
|
| 4 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19421 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19413 |
| published_at |
2026-04-16T12:55:00Z |
|
| 6 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19452 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.1951 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19557 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19554 |
| published_at |
2026-04-09T12:55:00Z |
|
| 10 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.197 |
| published_at |
2026-04-04T12:55:00Z |
|
| 11 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19502 |
| published_at |
2026-04-08T12:55:00Z |
|
| 12 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19423 |
| published_at |
2026-04-07T12:55:00Z |
|
| 13 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19653 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-57752 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-57752, GHSA-g5qg-72qw-gw5v
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-r4pw-m8mz-xbdq |
|
| 3 |
| url |
VCID-rx4e-7jj2-9udg |
| vulnerability_id |
VCID-rx4e-7jj2-9udg |
| summary |
Next.js missing cache-control header may lead to CDN caching empty reply
Next.js before 13.4.20-canary.13 lacks a cache-control header and thus empty prefetch responses may sometimes be cached by a CDN, causing a denial of service to all users requesting the same URL via that CDN. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-46298 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00359 |
| scoring_system |
epss |
| scoring_elements |
0.58041 |
| published_at |
2026-04-29T12:55:00Z |
|
| 1 |
| value |
0.00417 |
| scoring_system |
epss |
| scoring_elements |
0.6172 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.00417 |
| scoring_system |
epss |
| scoring_elements |
0.61769 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
0.00417 |
| scoring_system |
epss |
| scoring_elements |
0.61784 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.00417 |
| scoring_system |
epss |
| scoring_elements |
0.61805 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.00417 |
| scoring_system |
epss |
| scoring_elements |
0.61792 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00417 |
| scoring_system |
epss |
| scoring_elements |
0.61773 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00417 |
| scoring_system |
epss |
| scoring_elements |
0.61814 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.00417 |
| scoring_system |
epss |
| scoring_elements |
0.61819 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.00417 |
| scoring_system |
epss |
| scoring_elements |
0.61802 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.00417 |
| scoring_system |
epss |
| scoring_elements |
0.61797 |
| published_at |
2026-04-24T12:55:00Z |
|
| 11 |
| value |
0.00417 |
| scoring_system |
epss |
| scoring_elements |
0.61815 |
| published_at |
2026-04-26T12:55:00Z |
|
| 12 |
| value |
0.00417 |
| scoring_system |
epss |
| scoring_elements |
0.61719 |
| published_at |
2026-04-02T12:55:00Z |
|
| 13 |
| value |
0.00417 |
| scoring_system |
epss |
| scoring_elements |
0.61749 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-46298 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:npm/next@13.4.20-canary.0 |
| purl |
pkg:npm/next@13.4.20-canary.0 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1qzn-gxkv-wye3 |
|
| 1 |
| vulnerability |
VCID-3szn-4nn4-3fek |
|
| 2 |
| vulnerability |
VCID-54qu-9bx2-9ka8 |
|
| 3 |
| vulnerability |
VCID-5kj1-stm6-8qgv |
|
| 4 |
| vulnerability |
VCID-fpzm-tpp7-jbft |
|
| 5 |
| vulnerability |
VCID-fwnm-krm1-6kh6 |
|
| 6 |
| vulnerability |
VCID-gxry-99g5-9ubz |
|
| 7 |
| vulnerability |
VCID-hvgn-qbwr-tkbg |
|
| 8 |
| vulnerability |
VCID-jst7-263v-1ydx |
|
| 9 |
| vulnerability |
VCID-qz2s-22e2-ufg9 |
|
| 10 |
| vulnerability |
VCID-r4pw-m8mz-xbdq |
|
| 11 |
| vulnerability |
VCID-rx4e-7jj2-9udg |
|
| 12 |
| vulnerability |
VCID-sjdx-v2z6-3fcw |
|
| 13 |
| vulnerability |
VCID-ub68-nqch-bkdm |
|
| 14 |
| vulnerability |
VCID-ukfu-ane3-vfch |
|
| 15 |
| vulnerability |
VCID-vwym-qr5h-fue8 |
|
| 16 |
| vulnerability |
VCID-w35n-bwuy-5kce |
|
| 17 |
| vulnerability |
VCID-xu9v-gnn9-bfhf |
|
| 18 |
| vulnerability |
VCID-xv6q-hbf8-b7b1 |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:npm/next@13.4.20-canary.0 |
|
| 1 |
| url |
pkg:npm/next@13.4.20-canary.13 |
| purl |
pkg:npm/next@13.4.20-canary.13 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1qzn-gxkv-wye3 |
|
| 1 |
| vulnerability |
VCID-3szn-4nn4-3fek |
|
| 2 |
| vulnerability |
VCID-54qu-9bx2-9ka8 |
|
| 3 |
| vulnerability |
VCID-5kj1-stm6-8qgv |
|
| 4 |
| vulnerability |
VCID-fpzm-tpp7-jbft |
|
| 5 |
| vulnerability |
VCID-fwnm-krm1-6kh6 |
|
| 6 |
| vulnerability |
VCID-gxry-99g5-9ubz |
|
| 7 |
| vulnerability |
VCID-hvgn-qbwr-tkbg |
|
| 8 |
| vulnerability |
VCID-jst7-263v-1ydx |
|
| 9 |
| vulnerability |
VCID-qz2s-22e2-ufg9 |
|
| 10 |
| vulnerability |
VCID-r4pw-m8mz-xbdq |
|
| 11 |
| vulnerability |
VCID-rx4e-7jj2-9udg |
|
| 12 |
| vulnerability |
VCID-sjdx-v2z6-3fcw |
|
| 13 |
| vulnerability |
VCID-ub68-nqch-bkdm |
|
| 14 |
| vulnerability |
VCID-ukfu-ane3-vfch |
|
| 15 |
| vulnerability |
VCID-vwym-qr5h-fue8 |
|
| 16 |
| vulnerability |
VCID-w35n-bwuy-5kce |
|
| 17 |
| vulnerability |
VCID-xu9v-gnn9-bfhf |
|
| 18 |
| vulnerability |
VCID-xv6q-hbf8-b7b1 |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:npm/next@13.4.20-canary.13 |
|
| 2 |
| url |
pkg:npm/next@13.5.0 |
| purl |
pkg:npm/next@13.5.0 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1qzn-gxkv-wye3 |
|
| 1 |
| vulnerability |
VCID-3szn-4nn4-3fek |
|
| 2 |
| vulnerability |
VCID-54qu-9bx2-9ka8 |
|
| 3 |
| vulnerability |
VCID-5kj1-stm6-8qgv |
|
| 4 |
| vulnerability |
VCID-fpzm-tpp7-jbft |
|
| 5 |
| vulnerability |
VCID-fwnm-krm1-6kh6 |
|
| 6 |
| vulnerability |
VCID-gxry-99g5-9ubz |
|
| 7 |
| vulnerability |
VCID-jst7-263v-1ydx |
|
| 8 |
| vulnerability |
VCID-qz2s-22e2-ufg9 |
|
| 9 |
| vulnerability |
VCID-r4pw-m8mz-xbdq |
|
| 10 |
| vulnerability |
VCID-sjdx-v2z6-3fcw |
|
| 11 |
| vulnerability |
VCID-ub68-nqch-bkdm |
|
| 12 |
| vulnerability |
VCID-ukfu-ane3-vfch |
|
| 13 |
| vulnerability |
VCID-vwym-qr5h-fue8 |
|
| 14 |
| vulnerability |
VCID-w35n-bwuy-5kce |
|
| 15 |
| vulnerability |
VCID-xu9v-gnn9-bfhf |
|
| 16 |
| vulnerability |
VCID-xv6q-hbf8-b7b1 |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:npm/next@13.5.0 |
|
|
| aliases |
CVE-2023-46298, GHSA-c59h-r6p8-q9wc
|
| risk_score |
1.4 |
| exploitability |
0.5 |
| weighted_severity |
2.7 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-rx4e-7jj2-9udg |
|
| 4 |
| url |
VCID-sjdx-v2z6-3fcw |
| vulnerability_id |
VCID-sjdx-v2z6-3fcw |
| summary |
Next.js Content Injection Vulnerability for Image Optimization
A vulnerability in **Next.js Image Optimization** has been fixed in **v15.4.5** and **v14.2.31**. The issue allowed attacker-controlled external image sources to trigger file downloads with arbitrary content and filenames under specific configurations. This behavior could be abused for phishing or malicious file delivery.
All users relying on `images.domains` or `images.remotePatterns` are encouraged to upgrade and verify that external image sources are strictly validated.
More details at [Vercel Changelog](https://vercel.com/changelog/cve-2025-55173) |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-55173 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00197 |
| scoring_system |
epss |
| scoring_elements |
0.41389 |
| published_at |
2026-04-29T12:55:00Z |
|
| 1 |
| value |
0.00197 |
| scoring_system |
epss |
| scoring_elements |
0.41467 |
| published_at |
2026-04-26T12:55:00Z |
|
| 2 |
| value |
0.00197 |
| scoring_system |
epss |
| scoring_elements |
0.4147 |
| published_at |
2026-04-24T12:55:00Z |
|
| 3 |
| value |
0.00197 |
| scoring_system |
epss |
| scoring_elements |
0.41577 |
| published_at |
2026-04-21T12:55:00Z |
|
| 4 |
| value |
0.00197 |
| scoring_system |
epss |
| scoring_elements |
0.41652 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.00197 |
| scoring_system |
epss |
| scoring_elements |
0.41678 |
| published_at |
2026-04-16T12:55:00Z |
|
| 6 |
| value |
0.00197 |
| scoring_system |
epss |
| scoring_elements |
0.41631 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00197 |
| scoring_system |
epss |
| scoring_elements |
0.41677 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00197 |
| scoring_system |
epss |
| scoring_elements |
0.41654 |
| published_at |
2026-04-09T12:55:00Z |
|
| 9 |
| value |
0.00197 |
| scoring_system |
epss |
| scoring_elements |
0.41645 |
| published_at |
2026-04-12T12:55:00Z |
|
| 10 |
| value |
0.00197 |
| scoring_system |
epss |
| scoring_elements |
0.41668 |
| published_at |
2026-04-04T12:55:00Z |
|
| 11 |
| value |
0.00197 |
| scoring_system |
epss |
| scoring_elements |
0.41595 |
| published_at |
2026-04-07T12:55:00Z |
|
| 12 |
| value |
0.00206 |
| scoring_system |
epss |
| scoring_elements |
0.42968 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-55173 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-55173, GHSA-xv57-4mr9-wg8v
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-sjdx-v2z6-3fcw |
|
| 5 |
| url |
VCID-vwym-qr5h-fue8 |
| vulnerability_id |
VCID-vwym-qr5h-fue8 |
| summary |
Next.js Race Condition to Cache Poisoning
**Summary**
We received a responsible disclosure from Allam Rachid (zhero) for a low-severity race-condition vulnerability in Next.js. This issue only affects the **Pages Router** under certain misconfigurations, causing normal endpoints to serve `pageProps` data instead of standard HTML.
[Learn more here](https://vercel.com/changelog/cve-2025-32421)
**Credit**
Thank you to **Allam Rachid (zhero)** for the responsible disclosure. This research was rewarded as part of our bug bounty program. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-32421 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0036 |
| scoring_system |
epss |
| scoring_elements |
0.58152 |
| published_at |
2026-04-29T12:55:00Z |
|
| 1 |
| value |
0.0036 |
| scoring_system |
epss |
| scoring_elements |
0.58167 |
| published_at |
2026-04-26T12:55:00Z |
|
| 2 |
| value |
0.0036 |
| scoring_system |
epss |
| scoring_elements |
0.58153 |
| published_at |
2026-04-24T12:55:00Z |
|
| 3 |
| value |
0.0036 |
| scoring_system |
epss |
| scoring_elements |
0.58187 |
| published_at |
2026-04-21T12:55:00Z |
|
| 4 |
| value |
0.0036 |
| scoring_system |
epss |
| scoring_elements |
0.58212 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.0036 |
| scoring_system |
epss |
| scoring_elements |
0.58209 |
| published_at |
2026-04-16T12:55:00Z |
|
| 6 |
| value |
0.0036 |
| scoring_system |
epss |
| scoring_elements |
0.582 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.0036 |
| scoring_system |
epss |
| scoring_elements |
0.58146 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.0036 |
| scoring_system |
epss |
| scoring_elements |
0.58204 |
| published_at |
2026-04-09T12:55:00Z |
|
| 9 |
| value |
0.0036 |
| scoring_system |
epss |
| scoring_elements |
0.58151 |
| published_at |
2026-04-02T12:55:00Z |
|
| 10 |
| value |
0.0036 |
| scoring_system |
epss |
| scoring_elements |
0.58177 |
| published_at |
2026-04-13T12:55:00Z |
|
| 11 |
| value |
0.0036 |
| scoring_system |
epss |
| scoring_elements |
0.58197 |
| published_at |
2026-04-12T12:55:00Z |
|
| 12 |
| value |
0.0036 |
| scoring_system |
epss |
| scoring_elements |
0.58171 |
| published_at |
2026-04-04T12:55:00Z |
|
| 13 |
| value |
0.0036 |
| scoring_system |
epss |
| scoring_elements |
0.5822 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-32421 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:npm/next@14.2.24 |
| purl |
pkg:npm/next@14.2.24 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1qzn-gxkv-wye3 |
|
| 1 |
| vulnerability |
VCID-54qu-9bx2-9ka8 |
|
| 2 |
| vulnerability |
VCID-5kj1-stm6-8qgv |
|
| 3 |
| vulnerability |
VCID-fpzm-tpp7-jbft |
|
| 4 |
| vulnerability |
VCID-jst7-263v-1ydx |
|
| 5 |
| vulnerability |
VCID-qz2s-22e2-ufg9 |
|
| 6 |
| vulnerability |
VCID-r4pw-m8mz-xbdq |
|
| 7 |
| vulnerability |
VCID-sjdx-v2z6-3fcw |
|
| 8 |
| vulnerability |
VCID-ub68-nqch-bkdm |
|
| 9 |
| vulnerability |
VCID-w35n-bwuy-5kce |
|
| 10 |
| vulnerability |
VCID-xv6q-hbf8-b7b1 |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:npm/next@14.2.24 |
|
| 1 |
| url |
pkg:npm/next@15.1.6 |
| purl |
pkg:npm/next@15.1.6 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1qzn-gxkv-wye3 |
|
| 1 |
| vulnerability |
VCID-2tah-y5sg-hugp |
|
| 2 |
| vulnerability |
VCID-3m4d-v2y1-5ua4 |
|
| 3 |
| vulnerability |
VCID-54qu-9bx2-9ka8 |
|
| 4 |
| vulnerability |
VCID-5kj1-stm6-8qgv |
|
| 5 |
| vulnerability |
VCID-dyak-ybr6-fyhy |
|
| 6 |
| vulnerability |
VCID-jst7-263v-1ydx |
|
| 7 |
| vulnerability |
VCID-pqwe-3ukm-dkh4 |
|
| 8 |
| vulnerability |
VCID-qz2s-22e2-ufg9 |
|
| 9 |
| vulnerability |
VCID-r4pw-m8mz-xbdq |
|
| 10 |
| vulnerability |
VCID-sjdx-v2z6-3fcw |
|
| 11 |
| vulnerability |
VCID-ub68-nqch-bkdm |
|
| 12 |
| vulnerability |
VCID-w35n-bwuy-5kce |
|
| 13 |
| vulnerability |
VCID-xv6q-hbf8-b7b1 |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:npm/next@15.1.6 |
|
|
| aliases |
CVE-2025-32421, GHSA-qpjv-v59x-3qc4
|
| risk_score |
1.6 |
| exploitability |
0.5 |
| weighted_severity |
3.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-vwym-qr5h-fue8 |
|
| 6 |
| url |
VCID-x7z9-16hk-fqbs |
| vulnerability_id |
VCID-x7z9-16hk-fqbs |
| summary |
Directory Traversal in Next.js
### Impact
- **Not affected**: Deployments on ZEIT Now v2 ([https://zeit.co](https://zeit.co/)) are not affected
- **Not affected**: Deployments using the `serverless` target
- **Not affected**: Deployments using `next export`
- **Affected**: Users of Next.js below 9.3.2
We recommend everyone to upgrade regardless of whether you can reproduce the issue or not.
### Patches
https://github.com/zeit/next.js/releases/tag/v9.3.2
### References
https://github.com/zeit/next.js/releases/tag/v9.3.2 |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-5284 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.8195 |
| scoring_system |
epss |
| scoring_elements |
0.99197 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.8195 |
| scoring_system |
epss |
| scoring_elements |
0.99207 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.8195 |
| scoring_system |
epss |
| scoring_elements |
0.99205 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.8195 |
| scoring_system |
epss |
| scoring_elements |
0.99195 |
| published_at |
2026-04-01T12:55:00Z |
|
| 4 |
| value |
0.8195 |
| scoring_system |
epss |
| scoring_elements |
0.99204 |
| published_at |
2026-04-13T12:55:00Z |
|
| 5 |
| value |
0.8195 |
| scoring_system |
epss |
| scoring_elements |
0.99203 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.8195 |
| scoring_system |
epss |
| scoring_elements |
0.99199 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.8321 |
| scoring_system |
epss |
| scoring_elements |
0.9927 |
| published_at |
2026-04-24T12:55:00Z |
|
| 8 |
| value |
0.8321 |
| scoring_system |
epss |
| scoring_elements |
0.99272 |
| published_at |
2026-04-29T12:55:00Z |
|
| 9 |
| value |
0.8321 |
| scoring_system |
epss |
| scoring_elements |
0.99271 |
| published_at |
2026-04-26T12:55:00Z |
|
| 10 |
| value |
0.8321 |
| scoring_system |
epss |
| scoring_elements |
0.99268 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-5284 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://nvd.nist.gov/vuln/detail/CVE-2020-5284 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
5.0 |
| scoring_system |
cvssv2 |
| scoring_elements |
AV:N/AC:L/Au:N/C:P/I:N/A:N |
|
| 1 |
| value |
4.3 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N |
|
| 2 |
| value |
4.4 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:N |
|
| 3 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://nvd.nist.gov/vuln/detail/CVE-2020-5284 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-5284, GHSA-fq77-7p7r-83rj
|
| risk_score |
10.0 |
| exploitability |
2.0 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-x7z9-16hk-fqbs |
|
|
| Fixing_vulnerabilities |
|
| Risk_score | 10.0 |
| Resource_url | http://public2.vulnerablecode.io/packages/pkg:npm/next@7.0.1-canary.0 |