Lookup for vulnerable packages by Package URL.
| Purl | pkg:npm/next@9.2.3-canary.26 |
| Type | npm |
| Namespace | |
| Name | next |
| Version | 9.2.3-canary.26 |
| Qualifiers |
|
| Subpath | |
| Is_vulnerable | true |
| Next_non_vulnerable_version | 15.5.14 |
| Latest_non_vulnerable_version | 16.2.3 |
| Affected_by_vulnerabilities |
| 0 |
| url |
VCID-54qu-9bx2-9ka8 |
| vulnerability_id |
VCID-54qu-9bx2-9ka8 |
| summary |
Next.js Improper Middleware Redirect Handling Leads to SSRF
A vulnerability in **Next.js Middleware** has been fixed in **v14.2.32** and **v15.4.7**. The issue occurred when request headers were directly passed into `NextResponse.next()`. In self-hosted applications, this could allow Server-Side Request Forgery (SSRF) if certain sensitive headers from the incoming request were reflected back into the response.
All users implementing custom middleware logic in self-hosted environments are strongly encouraged to upgrade and verify correct usage of the `next()` function.
More details at [Vercel Changelog](https://vercel.com/changelog/cve-2025-57822) |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-57822 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.05626 |
| scoring_system |
epss |
| scoring_elements |
0.90302 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.05626 |
| scoring_system |
epss |
| scoring_elements |
0.90333 |
| published_at |
2026-04-08T12:55:00Z |
|
| 2 |
| value |
0.05626 |
| scoring_system |
epss |
| scoring_elements |
0.90319 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.05626 |
| scoring_system |
epss |
| scoring_elements |
0.90314 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.05626 |
| scoring_system |
epss |
| scoring_elements |
0.90357 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.05626 |
| scoring_system |
epss |
| scoring_elements |
0.90341 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.05626 |
| scoring_system |
epss |
| scoring_elements |
0.90348 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.05626 |
| scoring_system |
epss |
| scoring_elements |
0.9034 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.06479 |
| scoring_system |
epss |
| scoring_elements |
0.91113 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-57822 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-57822, GHSA-4342-x723-ch2f
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-54qu-9bx2-9ka8 |
|
| 1 |
| url |
VCID-r4pw-m8mz-xbdq |
| vulnerability_id |
VCID-r4pw-m8mz-xbdq |
| summary |
Next.js Affected by Cache Key Confusion for Image Optimization API Routes
A vulnerability in Next.js Image Optimization has been fixed in v15.4.5 and v14.2.31. When images returned from API routes vary based on request headers (such as `Cookie` or `Authorization`), these responses could be incorrectly cached and served to unauthorized users due to a cache key confusion bug.
All users are encouraged to upgrade if they use API routes to serve images that depend on request headers and have image optimization enabled.
More details at [Vercel Changelog](https://vercel.com/changelog/cve-2025-57752) |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-57752 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19434 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19421 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19413 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19452 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.1951 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19557 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19554 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19502 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19423 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19653 |
| published_at |
2026-04-02T12:55:00Z |
|
| 10 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.197 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-57752 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-57752, GHSA-g5qg-72qw-gw5v
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-r4pw-m8mz-xbdq |
|
| 2 |
| url |
VCID-rx4e-7jj2-9udg |
| vulnerability_id |
VCID-rx4e-7jj2-9udg |
| summary |
Next.js missing cache-control header may lead to CDN caching empty reply
Next.js before 13.4.20-canary.13 lacks a cache-control header and thus empty prefetch responses may sometimes be cached by a CDN, causing a denial of service to all users requesting the same URL via that CDN. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-46298 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00417 |
| scoring_system |
epss |
| scoring_elements |
0.6172 |
| published_at |
2026-04-07T12:55:00Z |
|
| 1 |
| value |
0.00417 |
| scoring_system |
epss |
| scoring_elements |
0.61802 |
| published_at |
2026-04-21T12:55:00Z |
|
| 2 |
| value |
0.00417 |
| scoring_system |
epss |
| scoring_elements |
0.61819 |
| published_at |
2026-04-18T12:55:00Z |
|
| 3 |
| value |
0.00417 |
| scoring_system |
epss |
| scoring_elements |
0.61814 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.00417 |
| scoring_system |
epss |
| scoring_elements |
0.61773 |
| published_at |
2026-04-13T12:55:00Z |
|
| 5 |
| value |
0.00417 |
| scoring_system |
epss |
| scoring_elements |
0.61792 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00417 |
| scoring_system |
epss |
| scoring_elements |
0.61749 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.00417 |
| scoring_system |
epss |
| scoring_elements |
0.61719 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.00417 |
| scoring_system |
epss |
| scoring_elements |
0.61805 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.00417 |
| scoring_system |
epss |
| scoring_elements |
0.61784 |
| published_at |
2026-04-09T12:55:00Z |
|
| 10 |
| value |
0.00417 |
| scoring_system |
epss |
| scoring_elements |
0.61769 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-46298 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:npm/next@13.4.20-canary.0 |
| purl |
pkg:npm/next@13.4.20-canary.0 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1qzn-gxkv-wye3 |
|
| 1 |
| vulnerability |
VCID-3szn-4nn4-3fek |
|
| 2 |
| vulnerability |
VCID-54qu-9bx2-9ka8 |
|
| 3 |
| vulnerability |
VCID-5kj1-stm6-8qgv |
|
| 4 |
| vulnerability |
VCID-fpzm-tpp7-jbft |
|
| 5 |
| vulnerability |
VCID-fwnm-krm1-6kh6 |
|
| 6 |
| vulnerability |
VCID-gxry-99g5-9ubz |
|
| 7 |
| vulnerability |
VCID-hvgn-qbwr-tkbg |
|
| 8 |
| vulnerability |
VCID-jst7-263v-1ydx |
|
| 9 |
| vulnerability |
VCID-qz2s-22e2-ufg9 |
|
| 10 |
| vulnerability |
VCID-r4pw-m8mz-xbdq |
|
| 11 |
| vulnerability |
VCID-rx4e-7jj2-9udg |
|
| 12 |
| vulnerability |
VCID-sjdx-v2z6-3fcw |
|
| 13 |
| vulnerability |
VCID-ub68-nqch-bkdm |
|
| 14 |
| vulnerability |
VCID-ukfu-ane3-vfch |
|
| 15 |
| vulnerability |
VCID-vwym-qr5h-fue8 |
|
| 16 |
| vulnerability |
VCID-w35n-bwuy-5kce |
|
| 17 |
| vulnerability |
VCID-xu9v-gnn9-bfhf |
|
| 18 |
| vulnerability |
VCID-xv6q-hbf8-b7b1 |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:npm/next@13.4.20-canary.0 |
|
| 1 |
| url |
pkg:npm/next@13.4.20-canary.13 |
| purl |
pkg:npm/next@13.4.20-canary.13 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1qzn-gxkv-wye3 |
|
| 1 |
| vulnerability |
VCID-3szn-4nn4-3fek |
|
| 2 |
| vulnerability |
VCID-54qu-9bx2-9ka8 |
|
| 3 |
| vulnerability |
VCID-5kj1-stm6-8qgv |
|
| 4 |
| vulnerability |
VCID-fpzm-tpp7-jbft |
|
| 5 |
| vulnerability |
VCID-fwnm-krm1-6kh6 |
|
| 6 |
| vulnerability |
VCID-gxry-99g5-9ubz |
|
| 7 |
| vulnerability |
VCID-hvgn-qbwr-tkbg |
|
| 8 |
| vulnerability |
VCID-jst7-263v-1ydx |
|
| 9 |
| vulnerability |
VCID-qz2s-22e2-ufg9 |
|
| 10 |
| vulnerability |
VCID-r4pw-m8mz-xbdq |
|
| 11 |
| vulnerability |
VCID-rx4e-7jj2-9udg |
|
| 12 |
| vulnerability |
VCID-sjdx-v2z6-3fcw |
|
| 13 |
| vulnerability |
VCID-ub68-nqch-bkdm |
|
| 14 |
| vulnerability |
VCID-ukfu-ane3-vfch |
|
| 15 |
| vulnerability |
VCID-vwym-qr5h-fue8 |
|
| 16 |
| vulnerability |
VCID-w35n-bwuy-5kce |
|
| 17 |
| vulnerability |
VCID-xu9v-gnn9-bfhf |
|
| 18 |
| vulnerability |
VCID-xv6q-hbf8-b7b1 |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:npm/next@13.4.20-canary.13 |
|
| 2 |
| url |
pkg:npm/next@13.5.0 |
| purl |
pkg:npm/next@13.5.0 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1qzn-gxkv-wye3 |
|
| 1 |
| vulnerability |
VCID-3szn-4nn4-3fek |
|
| 2 |
| vulnerability |
VCID-54qu-9bx2-9ka8 |
|
| 3 |
| vulnerability |
VCID-5kj1-stm6-8qgv |
|
| 4 |
| vulnerability |
VCID-fpzm-tpp7-jbft |
|
| 5 |
| vulnerability |
VCID-fwnm-krm1-6kh6 |
|
| 6 |
| vulnerability |
VCID-gxry-99g5-9ubz |
|
| 7 |
| vulnerability |
VCID-jst7-263v-1ydx |
|
| 8 |
| vulnerability |
VCID-qz2s-22e2-ufg9 |
|
| 9 |
| vulnerability |
VCID-r4pw-m8mz-xbdq |
|
| 10 |
| vulnerability |
VCID-sjdx-v2z6-3fcw |
|
| 11 |
| vulnerability |
VCID-ub68-nqch-bkdm |
|
| 12 |
| vulnerability |
VCID-ukfu-ane3-vfch |
|
| 13 |
| vulnerability |
VCID-vwym-qr5h-fue8 |
|
| 14 |
| vulnerability |
VCID-w35n-bwuy-5kce |
|
| 15 |
| vulnerability |
VCID-xu9v-gnn9-bfhf |
|
| 16 |
| vulnerability |
VCID-xv6q-hbf8-b7b1 |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:npm/next@13.5.0 |
|
|
| aliases |
CVE-2023-46298, GHSA-c59h-r6p8-q9wc
|
| risk_score |
1.4 |
| exploitability |
0.5 |
| weighted_severity |
2.7 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-rx4e-7jj2-9udg |
|
| 3 |
| url |
VCID-sjdx-v2z6-3fcw |
| vulnerability_id |
VCID-sjdx-v2z6-3fcw |
| summary |
Next.js Content Injection Vulnerability for Image Optimization
A vulnerability in **Next.js Image Optimization** has been fixed in **v15.4.5** and **v14.2.31**. The issue allowed attacker-controlled external image sources to trigger file downloads with arbitrary content and filenames under specific configurations. This behavior could be abused for phishing or malicious file delivery.
All users relying on `images.domains` or `images.remotePatterns` are encouraged to upgrade and verify that external image sources are strictly validated.
More details at [Vercel Changelog](https://vercel.com/changelog/cve-2025-55173) |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-55173 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00197 |
| scoring_system |
epss |
| scoring_elements |
0.41577 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00197 |
| scoring_system |
epss |
| scoring_elements |
0.41652 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.00197 |
| scoring_system |
epss |
| scoring_elements |
0.41678 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.00197 |
| scoring_system |
epss |
| scoring_elements |
0.41631 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.00197 |
| scoring_system |
epss |
| scoring_elements |
0.41677 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.00197 |
| scoring_system |
epss |
| scoring_elements |
0.41654 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00197 |
| scoring_system |
epss |
| scoring_elements |
0.41645 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00197 |
| scoring_system |
epss |
| scoring_elements |
0.41595 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.00197 |
| scoring_system |
epss |
| scoring_elements |
0.41668 |
| published_at |
2026-04-04T12:55:00Z |
|
| 9 |
| value |
0.00206 |
| scoring_system |
epss |
| scoring_elements |
0.42968 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-55173 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-55173, GHSA-xv57-4mr9-wg8v
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-sjdx-v2z6-3fcw |
|
| 4 |
| url |
VCID-vwym-qr5h-fue8 |
| vulnerability_id |
VCID-vwym-qr5h-fue8 |
| summary |
Next.js Race Condition to Cache Poisoning
**Summary**
We received a responsible disclosure from Allam Rachid (zhero) for a low-severity race-condition vulnerability in Next.js. This issue only affects the **Pages Router** under certain misconfigurations, causing normal endpoints to serve `pageProps` data instead of standard HTML.
[Learn more here](https://vercel.com/changelog/cve-2025-32421)
**Credit**
Thank you to **Allam Rachid (zhero)** for the responsible disclosure. This research was rewarded as part of our bug bounty program. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-32421 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0036 |
| scoring_system |
epss |
| scoring_elements |
0.58187 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.0036 |
| scoring_system |
epss |
| scoring_elements |
0.58151 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.0036 |
| scoring_system |
epss |
| scoring_elements |
0.58171 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.0036 |
| scoring_system |
epss |
| scoring_elements |
0.58146 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.0036 |
| scoring_system |
epss |
| scoring_elements |
0.582 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.0036 |
| scoring_system |
epss |
| scoring_elements |
0.58204 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.0036 |
| scoring_system |
epss |
| scoring_elements |
0.5822 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.0036 |
| scoring_system |
epss |
| scoring_elements |
0.58197 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.0036 |
| scoring_system |
epss |
| scoring_elements |
0.58177 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.0036 |
| scoring_system |
epss |
| scoring_elements |
0.58209 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.0036 |
| scoring_system |
epss |
| scoring_elements |
0.58212 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-32421 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:npm/next@14.2.24 |
| purl |
pkg:npm/next@14.2.24 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1qzn-gxkv-wye3 |
|
| 1 |
| vulnerability |
VCID-54qu-9bx2-9ka8 |
|
| 2 |
| vulnerability |
VCID-5kj1-stm6-8qgv |
|
| 3 |
| vulnerability |
VCID-fpzm-tpp7-jbft |
|
| 4 |
| vulnerability |
VCID-jst7-263v-1ydx |
|
| 5 |
| vulnerability |
VCID-qz2s-22e2-ufg9 |
|
| 6 |
| vulnerability |
VCID-r4pw-m8mz-xbdq |
|
| 7 |
| vulnerability |
VCID-sjdx-v2z6-3fcw |
|
| 8 |
| vulnerability |
VCID-ub68-nqch-bkdm |
|
| 9 |
| vulnerability |
VCID-w35n-bwuy-5kce |
|
| 10 |
| vulnerability |
VCID-xv6q-hbf8-b7b1 |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:npm/next@14.2.24 |
|
| 1 |
| url |
pkg:npm/next@15.1.6 |
| purl |
pkg:npm/next@15.1.6 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1qzn-gxkv-wye3 |
|
| 1 |
| vulnerability |
VCID-2tah-y5sg-hugp |
|
| 2 |
| vulnerability |
VCID-3m4d-v2y1-5ua4 |
|
| 3 |
| vulnerability |
VCID-54qu-9bx2-9ka8 |
|
| 4 |
| vulnerability |
VCID-5kj1-stm6-8qgv |
|
| 5 |
| vulnerability |
VCID-dyak-ybr6-fyhy |
|
| 6 |
| vulnerability |
VCID-jst7-263v-1ydx |
|
| 7 |
| vulnerability |
VCID-pqwe-3ukm-dkh4 |
|
| 8 |
| vulnerability |
VCID-qz2s-22e2-ufg9 |
|
| 9 |
| vulnerability |
VCID-r4pw-m8mz-xbdq |
|
| 10 |
| vulnerability |
VCID-sjdx-v2z6-3fcw |
|
| 11 |
| vulnerability |
VCID-ub68-nqch-bkdm |
|
| 12 |
| vulnerability |
VCID-w35n-bwuy-5kce |
|
| 13 |
| vulnerability |
VCID-xv6q-hbf8-b7b1 |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:npm/next@15.1.6 |
|
|
| aliases |
CVE-2025-32421, GHSA-qpjv-v59x-3qc4
|
| risk_score |
1.6 |
| exploitability |
0.5 |
| weighted_severity |
3.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-vwym-qr5h-fue8 |
|
| 5 |
| url |
VCID-x7z9-16hk-fqbs |
| vulnerability_id |
VCID-x7z9-16hk-fqbs |
| summary |
Directory Traversal in Next.js
### Impact
- **Not affected**: Deployments on ZEIT Now v2 ([https://zeit.co](https://zeit.co/)) are not affected
- **Not affected**: Deployments using the `serverless` target
- **Not affected**: Deployments using `next export`
- **Affected**: Users of Next.js below 9.3.2
We recommend everyone to upgrade regardless of whether you can reproduce the issue or not.
### Patches
https://github.com/zeit/next.js/releases/tag/v9.3.2
### References
https://github.com/zeit/next.js/releases/tag/v9.3.2 |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-5284 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.8195 |
| scoring_system |
epss |
| scoring_elements |
0.99195 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.8195 |
| scoring_system |
epss |
| scoring_elements |
0.99207 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.8195 |
| scoring_system |
epss |
| scoring_elements |
0.99205 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.8195 |
| scoring_system |
epss |
| scoring_elements |
0.99204 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.8195 |
| scoring_system |
epss |
| scoring_elements |
0.99203 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.8195 |
| scoring_system |
epss |
| scoring_elements |
0.99199 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.8195 |
| scoring_system |
epss |
| scoring_elements |
0.99197 |
| published_at |
2026-04-02T12:55:00Z |
|
| 7 |
| value |
0.8321 |
| scoring_system |
epss |
| scoring_elements |
0.99268 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-5284 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://nvd.nist.gov/vuln/detail/CVE-2020-5284 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
5.0 |
| scoring_system |
cvssv2 |
| scoring_elements |
AV:N/AC:L/Au:N/C:P/I:N/A:N |
|
| 1 |
| value |
4.3 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N |
|
| 2 |
| value |
4.4 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:N |
|
| 3 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://nvd.nist.gov/vuln/detail/CVE-2020-5284 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-5284, GHSA-fq77-7p7r-83rj
|
| risk_score |
10.0 |
| exploitability |
2.0 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-x7z9-16hk-fqbs |
|
|
| Fixing_vulnerabilities |
|
| Risk_score | 10.0 |
| Resource_url | http://public2.vulnerablecode.io/packages/pkg:npm/next@9.2.3-canary.26 |