Lookup for vulnerable packages by Package URL.

Purlpkg:npm/next@9.2.2-canary.10
Typenpm
Namespace
Namenext
Version9.2.2-canary.10
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version15.5.14
Latest_non_vulnerable_version16.2.3
Affected_by_vulnerabilities
0
url VCID-54qu-9bx2-9ka8
vulnerability_id VCID-54qu-9bx2-9ka8
summary
Next.js Improper Middleware Redirect Handling Leads to SSRF
A vulnerability in **Next.js Middleware** has been fixed in **v14.2.32** and **v15.4.7**. The issue occurred when request headers were directly passed into `NextResponse.next()`. In self-hosted applications, this could allow Server-Side Request Forgery (SSRF) if certain sensitive headers from the incoming request were reflected back into the response.

All users implementing custom middleware logic in self-hosted environments are strongly encouraged to upgrade and verify correct usage of the `next()` function.

More details at [Vercel Changelog](https://vercel.com/changelog/cve-2025-57822)
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-57822
reference_id
reference_type
scores
0
value 0.05626
scoring_system epss
scoring_elements 0.90302
published_at 2026-04-02T12:55:00Z
1
value 0.05626
scoring_system epss
scoring_elements 0.90333
published_at 2026-04-08T12:55:00Z
2
value 0.05626
scoring_system epss
scoring_elements 0.90319
published_at 2026-04-07T12:55:00Z
3
value 0.05626
scoring_system epss
scoring_elements 0.90314
published_at 2026-04-04T12:55:00Z
4
value 0.05626
scoring_system epss
scoring_elements 0.90357
published_at 2026-04-18T12:55:00Z
5
value 0.05626
scoring_system epss
scoring_elements 0.90341
published_at 2026-04-13T12:55:00Z
6
value 0.05626
scoring_system epss
scoring_elements 0.90348
published_at 2026-04-12T12:55:00Z
7
value 0.05626
scoring_system epss
scoring_elements 0.9034
published_at 2026-04-09T12:55:00Z
8
value 0.06479
scoring_system epss
scoring_elements 0.91113
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-57822
1
reference_url https://github.com/vercel/next.js
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/vercel/next.js
2
reference_url https://github.com/vercel/next.js/commit/9c9aaed5bb9338ef31b0517ccf0ab4414f2093d8
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-02T17:26:15Z/
url https://github.com/vercel/next.js/commit/9c9aaed5bb9338ef31b0517ccf0ab4414f2093d8
3
reference_url https://github.com/vercel/next.js/security/advisories/GHSA-4342-x723-ch2f
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N
1
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-02T17:26:15Z/
url https://github.com/vercel/next.js/security/advisories/GHSA-4342-x723-ch2f
4
reference_url https://nvd.nist.gov/vuln/detail/CVE-2025-57822
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2025-57822
5
reference_url https://vercel.com/changelog/cve-2025-57822
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-02T17:26:15Z/
url https://vercel.com/changelog/cve-2025-57822
6
reference_url https://github.com/advisories/GHSA-4342-x723-ch2f
reference_id GHSA-4342-x723-ch2f
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-4342-x723-ch2f
fixed_packages
0
url pkg:npm/next@14.2.32
purl pkg:npm/next@14.2.32
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1qzn-gxkv-wye3
1
vulnerability VCID-5kj1-stm6-8qgv
2
vulnerability VCID-fpzm-tpp7-jbft
3
vulnerability VCID-qz2s-22e2-ufg9
4
vulnerability VCID-w35n-bwuy-5kce
5
vulnerability VCID-xv6q-hbf8-b7b1
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/next@14.2.32
1
url pkg:npm/next@15.4.7
purl pkg:npm/next@15.4.7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1qzn-gxkv-wye3
1
vulnerability VCID-2tah-y5sg-hugp
2
vulnerability VCID-3m4d-v2y1-5ua4
3
vulnerability VCID-5kj1-stm6-8qgv
4
vulnerability VCID-pqwe-3ukm-dkh4
5
vulnerability VCID-qz2s-22e2-ufg9
6
vulnerability VCID-w35n-bwuy-5kce
7
vulnerability VCID-xv6q-hbf8-b7b1
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/next@15.4.7
aliases CVE-2025-57822, GHSA-4342-x723-ch2f
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-54qu-9bx2-9ka8
1
url VCID-r4pw-m8mz-xbdq
vulnerability_id VCID-r4pw-m8mz-xbdq
summary
Next.js Affected by Cache Key Confusion for Image Optimization API Routes
A vulnerability in Next.js Image Optimization has been fixed in v15.4.5 and v14.2.31. When images returned from API routes vary based on request headers (such as `Cookie` or `Authorization`), these responses could be incorrectly cached and served to unauthorized users due to a cache key confusion bug.

All users are encouraged to upgrade if they use API routes to serve images that depend on request headers and have image optimization enabled.

More details at [Vercel Changelog](https://vercel.com/changelog/cve-2025-57752)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-57752.json
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-57752.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-57752
reference_id
reference_type
scores
0
value 0.00063
scoring_system epss
scoring_elements 0.19434
published_at 2026-04-21T12:55:00Z
1
value 0.00063
scoring_system epss
scoring_elements 0.19421
published_at 2026-04-18T12:55:00Z
2
value 0.00063
scoring_system epss
scoring_elements 0.19413
published_at 2026-04-16T12:55:00Z
3
value 0.00063
scoring_system epss
scoring_elements 0.19452
published_at 2026-04-13T12:55:00Z
4
value 0.00063
scoring_system epss
scoring_elements 0.1951
published_at 2026-04-12T12:55:00Z
5
value 0.00063
scoring_system epss
scoring_elements 0.19557
published_at 2026-04-11T12:55:00Z
6
value 0.00063
scoring_system epss
scoring_elements 0.19554
published_at 2026-04-09T12:55:00Z
7
value 0.00063
scoring_system epss
scoring_elements 0.19502
published_at 2026-04-08T12:55:00Z
8
value 0.00063
scoring_system epss
scoring_elements 0.19423
published_at 2026-04-07T12:55:00Z
9
value 0.00063
scoring_system epss
scoring_elements 0.19653
published_at 2026-04-02T12:55:00Z
10
value 0.00063
scoring_system epss
scoring_elements 0.197
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-57752
2
reference_url https://github.com/vercel/next.js
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/vercel/next.js
3
reference_url https://github.com/vercel/next.js/commit/6b12c60c61ee80cb0443ccd20de82ca9b4422ddd
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-02T19:23:30Z/
url https://github.com/vercel/next.js/commit/6b12c60c61ee80cb0443ccd20de82ca9b4422ddd
4
reference_url https://github.com/vercel/next.js/pull/82114
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-02T19:23:30Z/
url https://github.com/vercel/next.js/pull/82114
5
reference_url https://github.com/vercel/next.js/security/advisories/GHSA-g5qg-72qw-gw5v
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-02T19:23:30Z/
url https://github.com/vercel/next.js/security/advisories/GHSA-g5qg-72qw-gw5v
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2025-57752
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2025-57752
7
reference_url https://vercel.com/changelog/cve-2025-57752
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-02T19:23:30Z/
url https://vercel.com/changelog/cve-2025-57752
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2392060
reference_id 2392060
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2392060
9
reference_url https://github.com/advisories/GHSA-g5qg-72qw-gw5v
reference_id GHSA-g5qg-72qw-gw5v
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-g5qg-72qw-gw5v
fixed_packages
0
url pkg:npm/next@14.2.31
purl pkg:npm/next@14.2.31
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1qzn-gxkv-wye3
1
vulnerability VCID-54qu-9bx2-9ka8
2
vulnerability VCID-5kj1-stm6-8qgv
3
vulnerability VCID-fpzm-tpp7-jbft
4
vulnerability VCID-qz2s-22e2-ufg9
5
vulnerability VCID-w35n-bwuy-5kce
6
vulnerability VCID-xv6q-hbf8-b7b1
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/next@14.2.31
1
url pkg:npm/next@15.4.5
purl pkg:npm/next@15.4.5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1qzn-gxkv-wye3
1
vulnerability VCID-2tah-y5sg-hugp
2
vulnerability VCID-3m4d-v2y1-5ua4
3
vulnerability VCID-54qu-9bx2-9ka8
4
vulnerability VCID-5kj1-stm6-8qgv
5
vulnerability VCID-pqwe-3ukm-dkh4
6
vulnerability VCID-qz2s-22e2-ufg9
7
vulnerability VCID-w35n-bwuy-5kce
8
vulnerability VCID-xv6q-hbf8-b7b1
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/next@15.4.5
aliases CVE-2025-57752, GHSA-g5qg-72qw-gw5v
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-r4pw-m8mz-xbdq
2
url VCID-rx4e-7jj2-9udg
vulnerability_id VCID-rx4e-7jj2-9udg
summary
Next.js missing cache-control header may lead to CDN caching empty reply
Next.js before 13.4.20-canary.13 lacks a cache-control header and thus empty prefetch responses may sometimes be cached by a CDN, causing a denial of service to all users requesting the same URL via that CDN.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-46298
reference_id
reference_type
scores
0
value 0.00417
scoring_system epss
scoring_elements 0.6172
published_at 2026-04-07T12:55:00Z
1
value 0.00417
scoring_system epss
scoring_elements 0.61802
published_at 2026-04-21T12:55:00Z
2
value 0.00417
scoring_system epss
scoring_elements 0.61819
published_at 2026-04-18T12:55:00Z
3
value 0.00417
scoring_system epss
scoring_elements 0.61814
published_at 2026-04-16T12:55:00Z
4
value 0.00417
scoring_system epss
scoring_elements 0.61773
published_at 2026-04-13T12:55:00Z
5
value 0.00417
scoring_system epss
scoring_elements 0.61792
published_at 2026-04-12T12:55:00Z
6
value 0.00417
scoring_system epss
scoring_elements 0.61749
published_at 2026-04-04T12:55:00Z
7
value 0.00417
scoring_system epss
scoring_elements 0.61719
published_at 2026-04-02T12:55:00Z
8
value 0.00417
scoring_system epss
scoring_elements 0.61805
published_at 2026-04-11T12:55:00Z
9
value 0.00417
scoring_system epss
scoring_elements 0.61784
published_at 2026-04-09T12:55:00Z
10
value 0.00417
scoring_system epss
scoring_elements 0.61769
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-46298
1
reference_url https://github.com/vercel/next.js
reference_id
reference_type
scores
0
value LOW
scoring_system generic_textual
scoring_elements
url https://github.com/vercel/next.js
2
reference_url https://github.com/vercel/next.js/commit/20d05958ff853e9c9e42139ffec294336881c648
reference_id
reference_type
scores
0
value LOW
scoring_system generic_textual
scoring_elements
url https://github.com/vercel/next.js/commit/20d05958ff853e9c9e42139ffec294336881c648
3
reference_url https://github.com/vercel/next.js/compare/v13.4.20-canary.12...v13.4.20-canary.13
reference_id
reference_type
scores
0
value LOW
scoring_system generic_textual
scoring_elements
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-12T17:50:22Z/
url https://github.com/vercel/next.js/compare/v13.4.20-canary.12...v13.4.20-canary.13
4
reference_url https://github.com/vercel/next.js/issues/45301
reference_id
reference_type
scores
0
value LOW
scoring_system generic_textual
scoring_elements
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-12T17:50:22Z/
url https://github.com/vercel/next.js/issues/45301
5
reference_url https://github.com/vercel/next.js/pull/54732
reference_id
reference_type
scores
0
value LOW
scoring_system generic_textual
scoring_elements
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-12T17:50:22Z/
url https://github.com/vercel/next.js/pull/54732
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2023-46298
reference_id CVE-2023-46298
reference_type
scores
0
value LOW
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2023-46298
7
reference_url https://github.com/advisories/GHSA-c59h-r6p8-q9wc
reference_id GHSA-c59h-r6p8-q9wc
reference_type
scores
0
value LOW
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-c59h-r6p8-q9wc
fixed_packages
0
url pkg:npm/next@13.4.20-canary.0
purl pkg:npm/next@13.4.20-canary.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1qzn-gxkv-wye3
1
vulnerability VCID-3szn-4nn4-3fek
2
vulnerability VCID-54qu-9bx2-9ka8
3
vulnerability VCID-5kj1-stm6-8qgv
4
vulnerability VCID-fpzm-tpp7-jbft
5
vulnerability VCID-fwnm-krm1-6kh6
6
vulnerability VCID-gxry-99g5-9ubz
7
vulnerability VCID-hvgn-qbwr-tkbg
8
vulnerability VCID-jst7-263v-1ydx
9
vulnerability VCID-qz2s-22e2-ufg9
10
vulnerability VCID-r4pw-m8mz-xbdq
11
vulnerability VCID-rx4e-7jj2-9udg
12
vulnerability VCID-sjdx-v2z6-3fcw
13
vulnerability VCID-ub68-nqch-bkdm
14
vulnerability VCID-ukfu-ane3-vfch
15
vulnerability VCID-vwym-qr5h-fue8
16
vulnerability VCID-w35n-bwuy-5kce
17
vulnerability VCID-xu9v-gnn9-bfhf
18
vulnerability VCID-xv6q-hbf8-b7b1
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/next@13.4.20-canary.0
1
url pkg:npm/next@13.4.20-canary.13
purl pkg:npm/next@13.4.20-canary.13
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1qzn-gxkv-wye3
1
vulnerability VCID-3szn-4nn4-3fek
2
vulnerability VCID-54qu-9bx2-9ka8
3
vulnerability VCID-5kj1-stm6-8qgv
4
vulnerability VCID-fpzm-tpp7-jbft
5
vulnerability VCID-fwnm-krm1-6kh6
6
vulnerability VCID-gxry-99g5-9ubz
7
vulnerability VCID-hvgn-qbwr-tkbg
8
vulnerability VCID-jst7-263v-1ydx
9
vulnerability VCID-qz2s-22e2-ufg9
10
vulnerability VCID-r4pw-m8mz-xbdq
11
vulnerability VCID-rx4e-7jj2-9udg
12
vulnerability VCID-sjdx-v2z6-3fcw
13
vulnerability VCID-ub68-nqch-bkdm
14
vulnerability VCID-ukfu-ane3-vfch
15
vulnerability VCID-vwym-qr5h-fue8
16
vulnerability VCID-w35n-bwuy-5kce
17
vulnerability VCID-xu9v-gnn9-bfhf
18
vulnerability VCID-xv6q-hbf8-b7b1
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/next@13.4.20-canary.13
2
url pkg:npm/next@13.5.0
purl pkg:npm/next@13.5.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1qzn-gxkv-wye3
1
vulnerability VCID-3szn-4nn4-3fek
2
vulnerability VCID-54qu-9bx2-9ka8
3
vulnerability VCID-5kj1-stm6-8qgv
4
vulnerability VCID-fpzm-tpp7-jbft
5
vulnerability VCID-fwnm-krm1-6kh6
6
vulnerability VCID-gxry-99g5-9ubz
7
vulnerability VCID-jst7-263v-1ydx
8
vulnerability VCID-qz2s-22e2-ufg9
9
vulnerability VCID-r4pw-m8mz-xbdq
10
vulnerability VCID-sjdx-v2z6-3fcw
11
vulnerability VCID-ub68-nqch-bkdm
12
vulnerability VCID-ukfu-ane3-vfch
13
vulnerability VCID-vwym-qr5h-fue8
14
vulnerability VCID-w35n-bwuy-5kce
15
vulnerability VCID-xu9v-gnn9-bfhf
16
vulnerability VCID-xv6q-hbf8-b7b1
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/next@13.5.0
aliases CVE-2023-46298, GHSA-c59h-r6p8-q9wc
risk_score 1.4
exploitability 0.5
weighted_severity 2.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rx4e-7jj2-9udg
3
url VCID-sjdx-v2z6-3fcw
vulnerability_id VCID-sjdx-v2z6-3fcw
summary
Next.js Content Injection Vulnerability for Image Optimization
A vulnerability in **Next.js Image Optimization** has been fixed in **v15.4.5** and **v14.2.31**. The issue allowed attacker-controlled external image sources to trigger file downloads with arbitrary content and filenames under specific configurations. This behavior could be abused for phishing or malicious file delivery.

All users relying on `images.domains` or `images.remotePatterns` are encouraged to upgrade and verify that external image sources are strictly validated.

More details at [Vercel Changelog](https://vercel.com/changelog/cve-2025-55173)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-55173.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-55173.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-55173
reference_id
reference_type
scores
0
value 0.00197
scoring_system epss
scoring_elements 0.41577
published_at 2026-04-21T12:55:00Z
1
value 0.00197
scoring_system epss
scoring_elements 0.41652
published_at 2026-04-18T12:55:00Z
2
value 0.00197
scoring_system epss
scoring_elements 0.41678
published_at 2026-04-16T12:55:00Z
3
value 0.00197
scoring_system epss
scoring_elements 0.41631
published_at 2026-04-13T12:55:00Z
4
value 0.00197
scoring_system epss
scoring_elements 0.41677
published_at 2026-04-11T12:55:00Z
5
value 0.00197
scoring_system epss
scoring_elements 0.41654
published_at 2026-04-09T12:55:00Z
6
value 0.00197
scoring_system epss
scoring_elements 0.41645
published_at 2026-04-12T12:55:00Z
7
value 0.00197
scoring_system epss
scoring_elements 0.41595
published_at 2026-04-07T12:55:00Z
8
value 0.00197
scoring_system epss
scoring_elements 0.41668
published_at 2026-04-04T12:55:00Z
9
value 0.00206
scoring_system epss
scoring_elements 0.42968
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-55173
2
reference_url https://github.com/vercel/next.js
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/vercel/next.js
3
reference_url https://github.com/vercel/next.js/commit/6b12c60c61ee80cb0443ccd20de82ca9b4422ddd
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-02T19:22:48Z/
url https://github.com/vercel/next.js/commit/6b12c60c61ee80cb0443ccd20de82ca9b4422ddd
4
reference_url https://github.com/vercel/next.js/security/advisories/GHSA-xv57-4mr9-wg8v
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-02T19:22:48Z/
url https://github.com/vercel/next.js/security/advisories/GHSA-xv57-4mr9-wg8v
5
reference_url https://nvd.nist.gov/vuln/detail/CVE-2025-55173
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2025-55173
6
reference_url https://vercel.com/changelog/cve-2025-55173
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-02T19:22:48Z/
url https://vercel.com/changelog/cve-2025-55173
7
reference_url http://vercel.com/changelog/cve-2025-55173
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url http://vercel.com/changelog/cve-2025-55173
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2392059
reference_id 2392059
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2392059
9
reference_url https://github.com/advisories/GHSA-xv57-4mr9-wg8v
reference_id GHSA-xv57-4mr9-wg8v
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-xv57-4mr9-wg8v
fixed_packages
0
url pkg:npm/next@14.2.31
purl pkg:npm/next@14.2.31
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1qzn-gxkv-wye3
1
vulnerability VCID-54qu-9bx2-9ka8
2
vulnerability VCID-5kj1-stm6-8qgv
3
vulnerability VCID-fpzm-tpp7-jbft
4
vulnerability VCID-qz2s-22e2-ufg9
5
vulnerability VCID-w35n-bwuy-5kce
6
vulnerability VCID-xv6q-hbf8-b7b1
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/next@14.2.31
1
url pkg:npm/next@15.4.5
purl pkg:npm/next@15.4.5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1qzn-gxkv-wye3
1
vulnerability VCID-2tah-y5sg-hugp
2
vulnerability VCID-3m4d-v2y1-5ua4
3
vulnerability VCID-54qu-9bx2-9ka8
4
vulnerability VCID-5kj1-stm6-8qgv
5
vulnerability VCID-pqwe-3ukm-dkh4
6
vulnerability VCID-qz2s-22e2-ufg9
7
vulnerability VCID-w35n-bwuy-5kce
8
vulnerability VCID-xv6q-hbf8-b7b1
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/next@15.4.5
aliases CVE-2025-55173, GHSA-xv57-4mr9-wg8v
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sjdx-v2z6-3fcw
4
url VCID-vwym-qr5h-fue8
vulnerability_id VCID-vwym-qr5h-fue8
summary
Next.js Race Condition to Cache Poisoning
**Summary**  
We received a responsible disclosure from Allam Rachid (zhero) for a low-severity race-condition vulnerability in Next.js. This issue only affects the **Pages Router** under certain misconfigurations, causing normal endpoints to serve `pageProps` data instead of standard HTML.

[Learn more here](https://vercel.com/changelog/cve-2025-32421)

**Credit**  
Thank you to **Allam Rachid (zhero)** for the responsible disclosure. This research was rewarded as part of our bug bounty program.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-32421.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-32421.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-32421
reference_id
reference_type
scores
0
value 0.0036
scoring_system epss
scoring_elements 0.58187
published_at 2026-04-21T12:55:00Z
1
value 0.0036
scoring_system epss
scoring_elements 0.58151
published_at 2026-04-02T12:55:00Z
2
value 0.0036
scoring_system epss
scoring_elements 0.58171
published_at 2026-04-04T12:55:00Z
3
value 0.0036
scoring_system epss
scoring_elements 0.58146
published_at 2026-04-07T12:55:00Z
4
value 0.0036
scoring_system epss
scoring_elements 0.582
published_at 2026-04-08T12:55:00Z
5
value 0.0036
scoring_system epss
scoring_elements 0.58204
published_at 2026-04-09T12:55:00Z
6
value 0.0036
scoring_system epss
scoring_elements 0.5822
published_at 2026-04-11T12:55:00Z
7
value 0.0036
scoring_system epss
scoring_elements 0.58197
published_at 2026-04-12T12:55:00Z
8
value 0.0036
scoring_system epss
scoring_elements 0.58177
published_at 2026-04-13T12:55:00Z
9
value 0.0036
scoring_system epss
scoring_elements 0.58209
published_at 2026-04-16T12:55:00Z
10
value 0.0036
scoring_system epss
scoring_elements 0.58212
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-32421
2
reference_url https://github.com/vercel/next.js
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
url https://github.com/vercel/next.js
3
reference_url https://github.com/vercel/next.js/security/advisories/GHSA-qpjv-v59x-3qc4
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value LOW
scoring_system cvssv3.1_qr
scoring_elements
2
value LOW
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T15:40:39Z/
url https://github.com/vercel/next.js/security/advisories/GHSA-qpjv-v59x-3qc4
4
reference_url https://nvd.nist.gov/vuln/detail/CVE-2025-32421
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2025-32421
5
reference_url https://vercel.com/changelog/cve-2025-32421
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T15:40:39Z/
url https://vercel.com/changelog/cve-2025-32421
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2366366
reference_id 2366366
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2366366
7
reference_url https://github.com/advisories/GHSA-qpjv-v59x-3qc4
reference_id GHSA-qpjv-v59x-3qc4
reference_type
scores
0
value LOW
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-qpjv-v59x-3qc4
fixed_packages
0
url pkg:npm/next@14.2.24
purl pkg:npm/next@14.2.24
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1qzn-gxkv-wye3
1
vulnerability VCID-54qu-9bx2-9ka8
2
vulnerability VCID-5kj1-stm6-8qgv
3
vulnerability VCID-fpzm-tpp7-jbft
4
vulnerability VCID-jst7-263v-1ydx
5
vulnerability VCID-qz2s-22e2-ufg9
6
vulnerability VCID-r4pw-m8mz-xbdq
7
vulnerability VCID-sjdx-v2z6-3fcw
8
vulnerability VCID-ub68-nqch-bkdm
9
vulnerability VCID-w35n-bwuy-5kce
10
vulnerability VCID-xv6q-hbf8-b7b1
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/next@14.2.24
1
url pkg:npm/next@15.1.6
purl pkg:npm/next@15.1.6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1qzn-gxkv-wye3
1
vulnerability VCID-2tah-y5sg-hugp
2
vulnerability VCID-3m4d-v2y1-5ua4
3
vulnerability VCID-54qu-9bx2-9ka8
4
vulnerability VCID-5kj1-stm6-8qgv
5
vulnerability VCID-dyak-ybr6-fyhy
6
vulnerability VCID-jst7-263v-1ydx
7
vulnerability VCID-pqwe-3ukm-dkh4
8
vulnerability VCID-qz2s-22e2-ufg9
9
vulnerability VCID-r4pw-m8mz-xbdq
10
vulnerability VCID-sjdx-v2z6-3fcw
11
vulnerability VCID-ub68-nqch-bkdm
12
vulnerability VCID-w35n-bwuy-5kce
13
vulnerability VCID-xv6q-hbf8-b7b1
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/next@15.1.6
aliases CVE-2025-32421, GHSA-qpjv-v59x-3qc4
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vwym-qr5h-fue8
5
url VCID-x7z9-16hk-fqbs
vulnerability_id VCID-x7z9-16hk-fqbs
summary
Directory Traversal in Next.js
### Impact

- **Not affected**: Deployments on ZEIT Now v2 ([https://zeit.co](https://zeit.co/)) are not affected
- **Not affected**: Deployments using the `serverless` target
- **Not affected**: Deployments using `next export`
- **Affected**: Users of Next.js below 9.3.2

We recommend everyone to upgrade regardless of whether you can reproduce the issue or not.

### Patches

https://github.com/zeit/next.js/releases/tag/v9.3.2

### References

https://github.com/zeit/next.js/releases/tag/v9.3.2
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-5284
reference_id
reference_type
scores
0
value 0.8195
scoring_system epss
scoring_elements 0.99195
published_at 2026-04-01T12:55:00Z
1
value 0.8195
scoring_system epss
scoring_elements 0.99207
published_at 2026-04-18T12:55:00Z
2
value 0.8195
scoring_system epss
scoring_elements 0.99205
published_at 2026-04-16T12:55:00Z
3
value 0.8195
scoring_system epss
scoring_elements 0.99204
published_at 2026-04-13T12:55:00Z
4
value 0.8195
scoring_system epss
scoring_elements 0.99203
published_at 2026-04-07T12:55:00Z
5
value 0.8195
scoring_system epss
scoring_elements 0.99199
published_at 2026-04-04T12:55:00Z
6
value 0.8195
scoring_system epss
scoring_elements 0.99197
published_at 2026-04-02T12:55:00Z
7
value 0.8321
scoring_system epss
scoring_elements 0.99268
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-5284
1
reference_url https://github.com/zeit/next.js/releases/tag/v9.3.2
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/zeit/next.js/releases/tag/v9.3.2
2
reference_url https://github.com/zeit/next.js/security/advisories/GHSA-fq77-7p7r-83rj
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/zeit/next.js/security/advisories/GHSA-fq77-7p7r-83rj
3
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-5284
reference_id
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:N/A:N
1
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
2
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:N
3
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2020-5284
4
reference_url https://www.npmjs.com/advisories/1503
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://www.npmjs.com/advisories/1503
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zeit:next.js:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:zeit:next.js:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zeit:next.js:*:*:*:*:*:*:*:*
6
reference_url https://github.com/advisories/GHSA-fq77-7p7r-83rj
reference_id GHSA-fq77-7p7r-83rj
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-fq77-7p7r-83rj
fixed_packages
0
url pkg:npm/next@9.3.2
purl pkg:npm/next@9.3.2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-54qu-9bx2-9ka8
1
vulnerability VCID-r4pw-m8mz-xbdq
2
vulnerability VCID-rx4e-7jj2-9udg
3
vulnerability VCID-sjdx-v2z6-3fcw
4
vulnerability VCID-vwym-qr5h-fue8
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/next@9.3.2
aliases CVE-2020-5284, GHSA-fq77-7p7r-83rj
risk_score 10.0
exploitability 2.0
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-x7z9-16hk-fqbs
Fixing_vulnerabilities
Risk_score10.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:npm/next@9.2.2-canary.10