Lookup for vulnerable packages by Package URL.

Purlpkg:npm/next@11.1.3-canary.101
Typenpm
Namespace
Namenext
Version11.1.3-canary.101
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version15.5.14
Latest_non_vulnerable_version16.2.3
Affected_by_vulnerabilities
0
url VCID-54qu-9bx2-9ka8
vulnerability_id VCID-54qu-9bx2-9ka8
summary
Next.js Improper Middleware Redirect Handling Leads to SSRF
A vulnerability in **Next.js Middleware** has been fixed in **v14.2.32** and **v15.4.7**. The issue occurred when request headers were directly passed into `NextResponse.next()`. In self-hosted applications, this could allow Server-Side Request Forgery (SSRF) if certain sensitive headers from the incoming request were reflected back into the response.

All users implementing custom middleware logic in self-hosted environments are strongly encouraged to upgrade and verify correct usage of the `next()` function.

More details at [Vercel Changelog](https://vercel.com/changelog/cve-2025-57822)
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-57822
reference_id
reference_type
scores
0
value 0.05626
scoring_system epss
scoring_elements 0.90314
published_at 2026-04-04T12:55:00Z
1
value 0.05626
scoring_system epss
scoring_elements 0.90357
published_at 2026-04-18T12:55:00Z
2
value 0.05626
scoring_system epss
scoring_elements 0.90341
published_at 2026-04-13T12:55:00Z
3
value 0.05626
scoring_system epss
scoring_elements 0.90348
published_at 2026-04-12T12:55:00Z
4
value 0.05626
scoring_system epss
scoring_elements 0.9034
published_at 2026-04-09T12:55:00Z
5
value 0.05626
scoring_system epss
scoring_elements 0.90333
published_at 2026-04-08T12:55:00Z
6
value 0.05626
scoring_system epss
scoring_elements 0.90319
published_at 2026-04-07T12:55:00Z
7
value 0.05626
scoring_system epss
scoring_elements 0.90302
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-57822
1
reference_url https://github.com/vercel/next.js
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/vercel/next.js
2
reference_url https://github.com/vercel/next.js/commit/9c9aaed5bb9338ef31b0517ccf0ab4414f2093d8
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-02T17:26:15Z/
url https://github.com/vercel/next.js/commit/9c9aaed5bb9338ef31b0517ccf0ab4414f2093d8
3
reference_url https://github.com/vercel/next.js/security/advisories/GHSA-4342-x723-ch2f
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N
1
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-02T17:26:15Z/
url https://github.com/vercel/next.js/security/advisories/GHSA-4342-x723-ch2f
4
reference_url https://nvd.nist.gov/vuln/detail/CVE-2025-57822
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2025-57822
5
reference_url https://vercel.com/changelog/cve-2025-57822
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-02T17:26:15Z/
url https://vercel.com/changelog/cve-2025-57822
6
reference_url https://github.com/advisories/GHSA-4342-x723-ch2f
reference_id GHSA-4342-x723-ch2f
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-4342-x723-ch2f
fixed_packages
0
url pkg:npm/next@14.2.32
purl pkg:npm/next@14.2.32
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1qzn-gxkv-wye3
1
vulnerability VCID-5kj1-stm6-8qgv
2
vulnerability VCID-fpzm-tpp7-jbft
3
vulnerability VCID-qz2s-22e2-ufg9
4
vulnerability VCID-w35n-bwuy-5kce
5
vulnerability VCID-xv6q-hbf8-b7b1
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/next@14.2.32
1
url pkg:npm/next@15.4.7
purl pkg:npm/next@15.4.7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1qzn-gxkv-wye3
1
vulnerability VCID-2tah-y5sg-hugp
2
vulnerability VCID-3m4d-v2y1-5ua4
3
vulnerability VCID-5kj1-stm6-8qgv
4
vulnerability VCID-pqwe-3ukm-dkh4
5
vulnerability VCID-qz2s-22e2-ufg9
6
vulnerability VCID-w35n-bwuy-5kce
7
vulnerability VCID-xv6q-hbf8-b7b1
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/next@15.4.7
aliases CVE-2025-57822, GHSA-4342-x723-ch2f
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-54qu-9bx2-9ka8
1
url VCID-5kj1-stm6-8qgv
vulnerability_id VCID-5kj1-stm6-8qgv
summary
Next.js: HTTP request smuggling in rewrites
## Summary
When Next.js rewrites proxy traffic to an external backend, a crafted `DELETE`/`OPTIONS` request using `Transfer-Encoding: chunked` could trigger request boundary disagreement between the proxy and backend. This could allow request smuggling through rewritten routes.

## Impact
An attacker could smuggle a second request to unintended backend routes (for example, internal/admin endpoints), bypassing assumptions that only the configured rewrite destination/path is reachable. This does not impact applications hosted on providers that handle rewrites at the CDN level, such as Vercel. 

## Patches
The vulnerability originated in an upstream library vendored by Next.js. It is fixed by updating that dependency’s behavior so `content-length: 0` is added only when both `content-length` and `transfer-encoding` are absent, and `transfer-encoding` is no longer removed in that code path.

## Workarounds
If upgrade is not immediately possible:
- Block chunked `DELETE`/`OPTIONS` requests on rewritten routes at your edge/proxy.
- Enforce authentication/authorization on backend routes per our [security guidance](https://nextjs.org/docs/app/guides/data-security).
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-29057.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-29057.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-29057
reference_id
reference_type
scores
0
value 0.00063
scoring_system epss
scoring_elements 0.19764
published_at 2026-04-11T12:55:00Z
1
value 0.00063
scoring_system epss
scoring_elements 0.19759
published_at 2026-04-09T12:55:00Z
2
value 0.00063
scoring_system epss
scoring_elements 0.19708
published_at 2026-04-08T12:55:00Z
3
value 0.00063
scoring_system epss
scoring_elements 0.19628
published_at 2026-04-07T12:55:00Z
4
value 0.00073
scoring_system epss
scoring_elements 0.22369
published_at 2026-04-02T12:55:00Z
5
value 0.00073
scoring_system epss
scoring_elements 0.22413
published_at 2026-04-04T12:55:00Z
6
value 0.00083
scoring_system epss
scoring_elements 0.24321
published_at 2026-04-18T12:55:00Z
7
value 0.00083
scoring_system epss
scoring_elements 0.24331
published_at 2026-04-16T12:55:00Z
8
value 0.00083
scoring_system epss
scoring_elements 0.24313
published_at 2026-04-13T12:55:00Z
9
value 0.00083
scoring_system epss
scoring_elements 0.2437
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-29057
2
reference_url https://github.com/vercel/next.js
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/vercel/next.js
3
reference_url https://github.com/vercel/next.js/commit/dc98c04f376c6a1df76ec3e0a2d07edf4abdabd6
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-18T14:47:14Z/
url https://github.com/vercel/next.js/commit/dc98c04f376c6a1df76ec3e0a2d07edf4abdabd6
4
reference_url https://github.com/vercel/next.js/releases/tag/v15.5.13
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-18T14:47:14Z/
url https://github.com/vercel/next.js/releases/tag/v15.5.13
5
reference_url https://github.com/vercel/next.js/releases/tag/v16.1.7
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-18T14:47:14Z/
url https://github.com/vercel/next.js/releases/tag/v16.1.7
6
reference_url https://github.com/vercel/next.js/security/advisories/GHSA-ggv3-7p47-pfv8
reference_id
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
1
value 6.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-18T14:47:14Z/
url https://github.com/vercel/next.js/security/advisories/GHSA-ggv3-7p47-pfv8
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2026-29057
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2026-29057
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2448515
reference_id 2448515
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2448515
9
reference_url https://github.com/advisories/GHSA-ggv3-7p47-pfv8
reference_id GHSA-ggv3-7p47-pfv8
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-ggv3-7p47-pfv8
fixed_packages
0
url pkg:npm/next@15.5.13
purl pkg:npm/next@15.5.13
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-qz2s-22e2-ufg9
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/next@15.5.13
1
url pkg:npm/next@16.1.7
purl pkg:npm/next@16.1.7
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/next@16.1.7
aliases CVE-2026-29057, GHSA-ggv3-7p47-pfv8
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5kj1-stm6-8qgv
2
url VCID-fwnm-krm1-6kh6
vulnerability_id VCID-fwnm-krm1-6kh6
summary
Denial of Service condition in Next.js image optimization
### Impact
The image optimization feature of Next.js contained a vulnerability which allowed for a potential Denial of Service (DoS) condition which could lead to excessive CPU consumption.

**Not affected:**
- The `next.config.js` file is configured with `images.unoptimized` set to `true` or `images.loader` set to a non-default value.
- The Next.js application is hosted on Vercel. 

### Patches
This issue was fully patched in Next.js `14.2.7`. We recommend that users upgrade to at least this version.

### Workarounds
Ensure that the `next.config.js` file has either `images.unoptimized`, `images.loader` or `images.loaderFile` assigned.

#### Credits
Brandon Dahler (brandondahler), AWS
Dimitrios Vlastaras
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47831.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47831.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-47831
reference_id
reference_type
scores
0
value 0.01699
scoring_system epss
scoring_elements 0.82319
published_at 2026-04-18T12:55:00Z
1
value 0.01699
scoring_system epss
scoring_elements 0.82284
published_at 2026-04-13T12:55:00Z
2
value 0.01699
scoring_system epss
scoring_elements 0.8229
published_at 2026-04-12T12:55:00Z
3
value 0.01699
scoring_system epss
scoring_elements 0.82296
published_at 2026-04-11T12:55:00Z
4
value 0.01699
scoring_system epss
scoring_elements 0.82277
published_at 2026-04-09T12:55:00Z
5
value 0.01699
scoring_system epss
scoring_elements 0.82247
published_at 2026-04-04T12:55:00Z
6
value 0.01699
scoring_system epss
scoring_elements 0.82269
published_at 2026-04-08T12:55:00Z
7
value 0.01699
scoring_system epss
scoring_elements 0.82242
published_at 2026-04-07T12:55:00Z
8
value 0.01699
scoring_system epss
scoring_elements 0.82227
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-47831
2
reference_url https://github.com/vercel/next.js
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value 4.6
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/vercel/next.js
3
reference_url https://github.com/vercel/next.js/commit/d11cbc9ff0b1aaefabcba9afe1e562e0b1fde65a
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value 4.6
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T14:51:58Z/
url https://github.com/vercel/next.js/commit/d11cbc9ff0b1aaefabcba9afe1e562e0b1fde65a
4
reference_url https://github.com/vercel/next.js/security/advisories/GHSA-g77x-44xx-532m
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
2
value 4.6
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T14:51:58Z/
url https://github.com/vercel/next.js/security/advisories/GHSA-g77x-44xx-532m
5
reference_url https://nvd.nist.gov/vuln/detail/CVE-2024-47831
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value 4.6
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2024-47831
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2318607
reference_id 2318607
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2318607
7
reference_url https://github.com/advisories/GHSA-g77x-44xx-532m
reference_id GHSA-g77x-44xx-532m
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-g77x-44xx-532m
fixed_packages
0
url pkg:npm/next@14.2.7
purl pkg:npm/next@14.2.7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1qzn-gxkv-wye3
1
vulnerability VCID-3szn-4nn4-3fek
2
vulnerability VCID-54qu-9bx2-9ka8
3
vulnerability VCID-5kj1-stm6-8qgv
4
vulnerability VCID-fpzm-tpp7-jbft
5
vulnerability VCID-jst7-263v-1ydx
6
vulnerability VCID-qz2s-22e2-ufg9
7
vulnerability VCID-r4pw-m8mz-xbdq
8
vulnerability VCID-sjdx-v2z6-3fcw
9
vulnerability VCID-ub68-nqch-bkdm
10
vulnerability VCID-ukfu-ane3-vfch
11
vulnerability VCID-v81y-zgg2-8ycf
12
vulnerability VCID-vwym-qr5h-fue8
13
vulnerability VCID-w35n-bwuy-5kce
14
vulnerability VCID-xv6q-hbf8-b7b1
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/next@14.2.7
aliases CVE-2024-47831, GHSA-g77x-44xx-532m
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fwnm-krm1-6kh6
3
url VCID-n7z1-rgg3-zbbb
vulnerability_id VCID-n7z1-rgg3-zbbb
summary Next.js is vulnerable to User Interface (UI) Misrepresentation of Critical Information. In order to be affected, the `next.config.js` file must have an `images.domains` array assigned and the image host assigned in `images.domains` must allow user-provided SVG. If the `next.config.js` file has `images.loader` assigned to something other than default, the instance is not affected. As a workaround, change `next.config.js` to use a different `loader configuration` other than the default.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-23646
reference_id
reference_type
scores
0
value 0.01381
scoring_system epss
scoring_elements 0.80233
published_at 2026-04-02T12:55:00Z
1
value 0.01381
scoring_system epss
scoring_elements 0.80308
published_at 2026-04-18T12:55:00Z
2
value 0.01381
scoring_system epss
scoring_elements 0.80307
published_at 2026-04-16T12:55:00Z
3
value 0.01381
scoring_system epss
scoring_elements 0.80276
published_at 2026-04-13T12:55:00Z
4
value 0.01381
scoring_system epss
scoring_elements 0.80283
published_at 2026-04-12T12:55:00Z
5
value 0.01381
scoring_system epss
scoring_elements 0.80298
published_at 2026-04-11T12:55:00Z
6
value 0.01381
scoring_system epss
scoring_elements 0.80279
published_at 2026-04-09T12:55:00Z
7
value 0.01381
scoring_system epss
scoring_elements 0.80269
published_at 2026-04-08T12:55:00Z
8
value 0.01381
scoring_system epss
scoring_elements 0.80242
published_at 2026-04-07T12:55:00Z
9
value 0.01381
scoring_system epss
scoring_elements 0.80254
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-23646
1
reference_url https://github.com/vercel/next.js
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/vercel/next.js
2
reference_url https://github.com/vercel/next.js/pull/34075
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/vercel/next.js/pull/34075
3
reference_url https://github.com/vercel/next.js/releases/tag/v12.1.0
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/vercel/next.js/releases/tag/v12.1.0
4
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-23646
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-23646
5
reference_url https://github.com/advisories/GHSA-fmvm-x8mv-47mj
reference_id GHSA-fmvm-x8mv-47mj
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-fmvm-x8mv-47mj
6
reference_url https://github.com/vercel/next.js/security/advisories/GHSA-fmvm-x8mv-47mj
reference_id GHSA-fmvm-x8mv-47mj
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/vercel/next.js/security/advisories/GHSA-fmvm-x8mv-47mj
fixed_packages
0
url pkg:npm/next@12.1.0
purl pkg:npm/next@12.1.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-54qu-9bx2-9ka8
1
vulnerability VCID-5kj1-stm6-8qgv
2
vulnerability VCID-fwnm-krm1-6kh6
3
vulnerability VCID-jst7-263v-1ydx
4
vulnerability VCID-qz2s-22e2-ufg9
5
vulnerability VCID-r4pw-m8mz-xbdq
6
vulnerability VCID-rx4e-7jj2-9udg
7
vulnerability VCID-sjdx-v2z6-3fcw
8
vulnerability VCID-ukfu-ane3-vfch
9
vulnerability VCID-vwym-qr5h-fue8
10
vulnerability VCID-xv6q-hbf8-b7b1
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/next@12.1.0
aliases CVE-2022-23646, GHSA-fmvm-x8mv-47mj
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-n7z1-rgg3-zbbb
4
url VCID-pqzm-ped7-vkff
vulnerability_id VCID-pqzm-ped7-vkff
summary
Improper Input Validation
Next handling invalid or malformed URLs could lead to a server crash. Deployments on Vercel are not affected, along with similar environments where invalid requests are filtered before reaching Next.js.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-43803
reference_id
reference_type
scores
0
value 0.0218
scoring_system epss
scoring_elements 0.84281
published_at 2026-04-01T12:55:00Z
1
value 0.0218
scoring_system epss
scoring_elements 0.84372
published_at 2026-04-18T12:55:00Z
2
value 0.0218
scoring_system epss
scoring_elements 0.84371
published_at 2026-04-16T12:55:00Z
3
value 0.0218
scoring_system epss
scoring_elements 0.84349
published_at 2026-04-13T12:55:00Z
4
value 0.0218
scoring_system epss
scoring_elements 0.84353
published_at 2026-04-12T12:55:00Z
5
value 0.0218
scoring_system epss
scoring_elements 0.8436
published_at 2026-04-11T12:55:00Z
6
value 0.0218
scoring_system epss
scoring_elements 0.84342
published_at 2026-04-09T12:55:00Z
7
value 0.0218
scoring_system epss
scoring_elements 0.84337
published_at 2026-04-08T12:55:00Z
8
value 0.0218
scoring_system epss
scoring_elements 0.84315
published_at 2026-04-07T12:55:00Z
9
value 0.0218
scoring_system epss
scoring_elements 0.84314
published_at 2026-04-04T12:55:00Z
10
value 0.0218
scoring_system epss
scoring_elements 0.84294
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-43803
1
reference_url https://github.com/vercel/next.js
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/vercel/next.js
2
reference_url https://github.com/vercel/next.js/commit/6d98b4fb4315dec1badecf0e9bdc212a4272b264
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/vercel/next.js/commit/6d98b4fb4315dec1badecf0e9bdc212a4272b264
3
reference_url https://github.com/vercel/next.js/pull/32080
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/vercel/next.js/pull/32080
4
reference_url https://github.com/vercel/next.js/releases/tag/v11.1.3
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/vercel/next.js/releases/tag/v11.1.3
5
reference_url https://github.com/vercel/next.js/releases/v12.0.5
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/vercel/next.js/releases/v12.0.5
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2021-43803
reference_id CVE-2021-43803
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2021-43803
7
reference_url https://github.com/advisories/GHSA-25mp-g6fv-mqxx
reference_id GHSA-25mp-g6fv-mqxx
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-25mp-g6fv-mqxx
8
reference_url https://github.com/vercel/next.js/security/advisories/GHSA-25mp-g6fv-mqxx
reference_id GHSA-25mp-g6fv-mqxx
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/vercel/next.js/security/advisories/GHSA-25mp-g6fv-mqxx
fixed_packages
0
url pkg:npm/next@11.1.3
purl pkg:npm/next@11.1.3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-54qu-9bx2-9ka8
1
vulnerability VCID-5kj1-stm6-8qgv
2
vulnerability VCID-fwnm-krm1-6kh6
3
vulnerability VCID-n7z1-rgg3-zbbb
4
vulnerability VCID-qz2s-22e2-ufg9
5
vulnerability VCID-r4pw-m8mz-xbdq
6
vulnerability VCID-rx4e-7jj2-9udg
7
vulnerability VCID-sjdx-v2z6-3fcw
8
vulnerability VCID-ukfu-ane3-vfch
9
vulnerability VCID-vwym-qr5h-fue8
10
vulnerability VCID-xv6q-hbf8-b7b1
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/next@11.1.3
1
url pkg:npm/next@12.0.5
purl pkg:npm/next@12.0.5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-54qu-9bx2-9ka8
1
vulnerability VCID-5kj1-stm6-8qgv
2
vulnerability VCID-fwnm-krm1-6kh6
3
vulnerability VCID-jst7-263v-1ydx
4
vulnerability VCID-n7z1-rgg3-zbbb
5
vulnerability VCID-qz2s-22e2-ufg9
6
vulnerability VCID-r4pw-m8mz-xbdq
7
vulnerability VCID-rx4e-7jj2-9udg
8
vulnerability VCID-sjdx-v2z6-3fcw
9
vulnerability VCID-tyjv-73n8-fybf
10
vulnerability VCID-ukfu-ane3-vfch
11
vulnerability VCID-vwym-qr5h-fue8
12
vulnerability VCID-xv6q-hbf8-b7b1
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/next@12.0.5
aliases CVE-2021-43803, GHSA-25mp-g6fv-mqxx
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pqzm-ped7-vkff
5
url VCID-qz2s-22e2-ufg9
vulnerability_id VCID-qz2s-22e2-ufg9
summary
Next.js: Unbounded next/image disk cache growth can exhaust storage
## Summary
The default Next.js image optimization disk cache (`/_next/image`) did not have a configurable upper bound, allowing unbounded cache growth.

## Impact
An attacker could generate many unique image-optimization variants and exhaust disk space, causing denial of service. Note that this does not impact platforms that have their own image optimization capabilities, such as Vercel.

## Patches
Fixed by adding an LRU-backed disk cache with `images.maximumDiskCacheSize`, including eviction of least-recently-used entries when the limit is exceeded. Setting `maximumDiskCacheSize: 0` disables disk caching. 

## Workarounds
If upgrade is not immediately possible:
- Periodically clean `.next/cache/images`.
- Reduce variant cardinality (e.g., tighten values for `images.localPatterns`, `images.remotePatterns`, and `images.qualities`)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-27980.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-27980.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-27980
reference_id
reference_type
scores
0
value 0.00018
scoring_system epss
scoring_elements 0.04466
published_at 2026-04-04T12:55:00Z
1
value 0.00018
scoring_system epss
scoring_elements 0.0444
published_at 2026-04-02T12:55:00Z
2
value 0.00021
scoring_system epss
scoring_elements 0.05495
published_at 2026-04-18T12:55:00Z
3
value 0.00021
scoring_system epss
scoring_elements 0.0552
published_at 2026-04-07T12:55:00Z
4
value 0.00021
scoring_system epss
scoring_elements 0.05558
published_at 2026-04-08T12:55:00Z
5
value 0.00021
scoring_system epss
scoring_elements 0.05581
published_at 2026-04-09T12:55:00Z
6
value 0.00021
scoring_system epss
scoring_elements 0.05554
published_at 2026-04-11T12:55:00Z
7
value 0.00021
scoring_system epss
scoring_elements 0.05541
published_at 2026-04-12T12:55:00Z
8
value 0.00021
scoring_system epss
scoring_elements 0.05534
published_at 2026-04-13T12:55:00Z
9
value 0.00021
scoring_system epss
scoring_elements 0.05484
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-27980
2
reference_url https://github.com/vercel/next.js
reference_id
reference_type
scores
0
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/vercel/next.js
3
reference_url https://github.com/vercel/next.js/commit/39eb8e0ac498b48855a0430fbf4c22276a73b4bd
reference_id
reference_type
scores
0
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-18T19:50:06Z/
url https://github.com/vercel/next.js/commit/39eb8e0ac498b48855a0430fbf4c22276a73b4bd
4
reference_url https://github.com/vercel/next.js/releases/tag/v16.1.7
reference_id
reference_type
scores
0
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-18T19:50:06Z/
url https://github.com/vercel/next.js/releases/tag/v16.1.7
5
reference_url https://github.com/vercel/next.js/security/advisories/GHSA-3x4c-7xq6-9pq8
reference_id
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-18T19:50:06Z/
url https://github.com/vercel/next.js/security/advisories/GHSA-3x4c-7xq6-9pq8
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2026-27980
reference_id
reference_type
scores
0
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2026-27980
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2448509
reference_id 2448509
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2448509
8
reference_url https://github.com/advisories/GHSA-3x4c-7xq6-9pq8
reference_id GHSA-3x4c-7xq6-9pq8
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-3x4c-7xq6-9pq8
fixed_packages
0
url pkg:npm/next@15.5.14
purl pkg:npm/next@15.5.14
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/next@15.5.14
1
url pkg:npm/next@15.6.0-canary.0
purl pkg:npm/next@15.6.0-canary.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1qzn-gxkv-wye3
1
vulnerability VCID-2tah-y5sg-hugp
2
vulnerability VCID-3m4d-v2y1-5ua4
3
vulnerability VCID-w35n-bwuy-5kce
4
vulnerability VCID-xv6q-hbf8-b7b1
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/next@15.6.0-canary.0
2
url pkg:npm/next@16.1.7
purl pkg:npm/next@16.1.7
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/next@16.1.7
aliases CVE-2026-27980, GHSA-3x4c-7xq6-9pq8
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qz2s-22e2-ufg9
6
url VCID-r4pw-m8mz-xbdq
vulnerability_id VCID-r4pw-m8mz-xbdq
summary
Next.js Affected by Cache Key Confusion for Image Optimization API Routes
A vulnerability in Next.js Image Optimization has been fixed in v15.4.5 and v14.2.31. When images returned from API routes vary based on request headers (such as `Cookie` or `Authorization`), these responses could be incorrectly cached and served to unauthorized users due to a cache key confusion bug.

All users are encouraged to upgrade if they use API routes to serve images that depend on request headers and have image optimization enabled.

More details at [Vercel Changelog](https://vercel.com/changelog/cve-2025-57752)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-57752.json
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-57752.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-57752
reference_id
reference_type
scores
0
value 0.00063
scoring_system epss
scoring_elements 0.19421
published_at 2026-04-18T12:55:00Z
1
value 0.00063
scoring_system epss
scoring_elements 0.19413
published_at 2026-04-16T12:55:00Z
2
value 0.00063
scoring_system epss
scoring_elements 0.19452
published_at 2026-04-13T12:55:00Z
3
value 0.00063
scoring_system epss
scoring_elements 0.1951
published_at 2026-04-12T12:55:00Z
4
value 0.00063
scoring_system epss
scoring_elements 0.19557
published_at 2026-04-11T12:55:00Z
5
value 0.00063
scoring_system epss
scoring_elements 0.19653
published_at 2026-04-02T12:55:00Z
6
value 0.00063
scoring_system epss
scoring_elements 0.19502
published_at 2026-04-08T12:55:00Z
7
value 0.00063
scoring_system epss
scoring_elements 0.19423
published_at 2026-04-07T12:55:00Z
8
value 0.00063
scoring_system epss
scoring_elements 0.19554
published_at 2026-04-09T12:55:00Z
9
value 0.00063
scoring_system epss
scoring_elements 0.197
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-57752
2
reference_url https://github.com/vercel/next.js
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/vercel/next.js
3
reference_url https://github.com/vercel/next.js/commit/6b12c60c61ee80cb0443ccd20de82ca9b4422ddd
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-02T19:23:30Z/
url https://github.com/vercel/next.js/commit/6b12c60c61ee80cb0443ccd20de82ca9b4422ddd
4
reference_url https://github.com/vercel/next.js/pull/82114
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-02T19:23:30Z/
url https://github.com/vercel/next.js/pull/82114
5
reference_url https://github.com/vercel/next.js/security/advisories/GHSA-g5qg-72qw-gw5v
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-02T19:23:30Z/
url https://github.com/vercel/next.js/security/advisories/GHSA-g5qg-72qw-gw5v
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2025-57752
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2025-57752
7
reference_url https://vercel.com/changelog/cve-2025-57752
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-02T19:23:30Z/
url https://vercel.com/changelog/cve-2025-57752
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2392060
reference_id 2392060
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2392060
9
reference_url https://github.com/advisories/GHSA-g5qg-72qw-gw5v
reference_id GHSA-g5qg-72qw-gw5v
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-g5qg-72qw-gw5v
fixed_packages
0
url pkg:npm/next@14.2.31
purl pkg:npm/next@14.2.31
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1qzn-gxkv-wye3
1
vulnerability VCID-54qu-9bx2-9ka8
2
vulnerability VCID-5kj1-stm6-8qgv
3
vulnerability VCID-fpzm-tpp7-jbft
4
vulnerability VCID-qz2s-22e2-ufg9
5
vulnerability VCID-w35n-bwuy-5kce
6
vulnerability VCID-xv6q-hbf8-b7b1
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/next@14.2.31
1
url pkg:npm/next@15.4.5
purl pkg:npm/next@15.4.5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1qzn-gxkv-wye3
1
vulnerability VCID-2tah-y5sg-hugp
2
vulnerability VCID-3m4d-v2y1-5ua4
3
vulnerability VCID-54qu-9bx2-9ka8
4
vulnerability VCID-5kj1-stm6-8qgv
5
vulnerability VCID-pqwe-3ukm-dkh4
6
vulnerability VCID-qz2s-22e2-ufg9
7
vulnerability VCID-w35n-bwuy-5kce
8
vulnerability VCID-xv6q-hbf8-b7b1
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/next@15.4.5
aliases CVE-2025-57752, GHSA-g5qg-72qw-gw5v
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-r4pw-m8mz-xbdq
7
url VCID-rx4e-7jj2-9udg
vulnerability_id VCID-rx4e-7jj2-9udg
summary
Next.js missing cache-control header may lead to CDN caching empty reply
Next.js before 13.4.20-canary.13 lacks a cache-control header and thus empty prefetch responses may sometimes be cached by a CDN, causing a denial of service to all users requesting the same URL via that CDN.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-46298
reference_id
reference_type
scores
0
value 0.00417
scoring_system epss
scoring_elements 0.6172
published_at 2026-04-07T12:55:00Z
1
value 0.00417
scoring_system epss
scoring_elements 0.61819
published_at 2026-04-18T12:55:00Z
2
value 0.00417
scoring_system epss
scoring_elements 0.61814
published_at 2026-04-16T12:55:00Z
3
value 0.00417
scoring_system epss
scoring_elements 0.61773
published_at 2026-04-13T12:55:00Z
4
value 0.00417
scoring_system epss
scoring_elements 0.61792
published_at 2026-04-12T12:55:00Z
5
value 0.00417
scoring_system epss
scoring_elements 0.61805
published_at 2026-04-11T12:55:00Z
6
value 0.00417
scoring_system epss
scoring_elements 0.61749
published_at 2026-04-04T12:55:00Z
7
value 0.00417
scoring_system epss
scoring_elements 0.61719
published_at 2026-04-02T12:55:00Z
8
value 0.00417
scoring_system epss
scoring_elements 0.61784
published_at 2026-04-09T12:55:00Z
9
value 0.00417
scoring_system epss
scoring_elements 0.61769
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-46298
1
reference_url https://github.com/vercel/next.js
reference_id
reference_type
scores
0
value LOW
scoring_system generic_textual
scoring_elements
url https://github.com/vercel/next.js
2
reference_url https://github.com/vercel/next.js/commit/20d05958ff853e9c9e42139ffec294336881c648
reference_id
reference_type
scores
0
value LOW
scoring_system generic_textual
scoring_elements
url https://github.com/vercel/next.js/commit/20d05958ff853e9c9e42139ffec294336881c648
3
reference_url https://github.com/vercel/next.js/compare/v13.4.20-canary.12...v13.4.20-canary.13
reference_id
reference_type
scores
0
value LOW
scoring_system generic_textual
scoring_elements
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-12T17:50:22Z/
url https://github.com/vercel/next.js/compare/v13.4.20-canary.12...v13.4.20-canary.13
4
reference_url https://github.com/vercel/next.js/issues/45301
reference_id
reference_type
scores
0
value LOW
scoring_system generic_textual
scoring_elements
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-12T17:50:22Z/
url https://github.com/vercel/next.js/issues/45301
5
reference_url https://github.com/vercel/next.js/pull/54732
reference_id
reference_type
scores
0
value LOW
scoring_system generic_textual
scoring_elements
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-12T17:50:22Z/
url https://github.com/vercel/next.js/pull/54732
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2023-46298
reference_id CVE-2023-46298
reference_type
scores
0
value LOW
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2023-46298
7
reference_url https://github.com/advisories/GHSA-c59h-r6p8-q9wc
reference_id GHSA-c59h-r6p8-q9wc
reference_type
scores
0
value LOW
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-c59h-r6p8-q9wc
fixed_packages
0
url pkg:npm/next@13.4.20-canary.0
purl pkg:npm/next@13.4.20-canary.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1qzn-gxkv-wye3
1
vulnerability VCID-3szn-4nn4-3fek
2
vulnerability VCID-54qu-9bx2-9ka8
3
vulnerability VCID-5kj1-stm6-8qgv
4
vulnerability VCID-fpzm-tpp7-jbft
5
vulnerability VCID-fwnm-krm1-6kh6
6
vulnerability VCID-gxry-99g5-9ubz
7
vulnerability VCID-hvgn-qbwr-tkbg
8
vulnerability VCID-jst7-263v-1ydx
9
vulnerability VCID-qz2s-22e2-ufg9
10
vulnerability VCID-r4pw-m8mz-xbdq
11
vulnerability VCID-rx4e-7jj2-9udg
12
vulnerability VCID-sjdx-v2z6-3fcw
13
vulnerability VCID-ub68-nqch-bkdm
14
vulnerability VCID-ukfu-ane3-vfch
15
vulnerability VCID-vwym-qr5h-fue8
16
vulnerability VCID-w35n-bwuy-5kce
17
vulnerability VCID-xu9v-gnn9-bfhf
18
vulnerability VCID-xv6q-hbf8-b7b1
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/next@13.4.20-canary.0
1
url pkg:npm/next@13.4.20-canary.13
purl pkg:npm/next@13.4.20-canary.13
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1qzn-gxkv-wye3
1
vulnerability VCID-3szn-4nn4-3fek
2
vulnerability VCID-54qu-9bx2-9ka8
3
vulnerability VCID-5kj1-stm6-8qgv
4
vulnerability VCID-fpzm-tpp7-jbft
5
vulnerability VCID-fwnm-krm1-6kh6
6
vulnerability VCID-gxry-99g5-9ubz
7
vulnerability VCID-hvgn-qbwr-tkbg
8
vulnerability VCID-jst7-263v-1ydx
9
vulnerability VCID-qz2s-22e2-ufg9
10
vulnerability VCID-r4pw-m8mz-xbdq
11
vulnerability VCID-rx4e-7jj2-9udg
12
vulnerability VCID-sjdx-v2z6-3fcw
13
vulnerability VCID-ub68-nqch-bkdm
14
vulnerability VCID-ukfu-ane3-vfch
15
vulnerability VCID-vwym-qr5h-fue8
16
vulnerability VCID-w35n-bwuy-5kce
17
vulnerability VCID-xu9v-gnn9-bfhf
18
vulnerability VCID-xv6q-hbf8-b7b1
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/next@13.4.20-canary.13
2
url pkg:npm/next@13.5.0
purl pkg:npm/next@13.5.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1qzn-gxkv-wye3
1
vulnerability VCID-3szn-4nn4-3fek
2
vulnerability VCID-54qu-9bx2-9ka8
3
vulnerability VCID-5kj1-stm6-8qgv
4
vulnerability VCID-fpzm-tpp7-jbft
5
vulnerability VCID-fwnm-krm1-6kh6
6
vulnerability VCID-gxry-99g5-9ubz
7
vulnerability VCID-jst7-263v-1ydx
8
vulnerability VCID-qz2s-22e2-ufg9
9
vulnerability VCID-r4pw-m8mz-xbdq
10
vulnerability VCID-sjdx-v2z6-3fcw
11
vulnerability VCID-ub68-nqch-bkdm
12
vulnerability VCID-ukfu-ane3-vfch
13
vulnerability VCID-vwym-qr5h-fue8
14
vulnerability VCID-w35n-bwuy-5kce
15
vulnerability VCID-xu9v-gnn9-bfhf
16
vulnerability VCID-xv6q-hbf8-b7b1
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/next@13.5.0
aliases CVE-2023-46298, GHSA-c59h-r6p8-q9wc
risk_score 1.4
exploitability 0.5
weighted_severity 2.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rx4e-7jj2-9udg
8
url VCID-sjdx-v2z6-3fcw
vulnerability_id VCID-sjdx-v2z6-3fcw
summary
Next.js Content Injection Vulnerability for Image Optimization
A vulnerability in **Next.js Image Optimization** has been fixed in **v15.4.5** and **v14.2.31**. The issue allowed attacker-controlled external image sources to trigger file downloads with arbitrary content and filenames under specific configurations. This behavior could be abused for phishing or malicious file delivery.

All users relying on `images.domains` or `images.remotePatterns` are encouraged to upgrade and verify that external image sources are strictly validated.

More details at [Vercel Changelog](https://vercel.com/changelog/cve-2025-55173)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-55173.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-55173.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-55173
reference_id
reference_type
scores
0
value 0.00197
scoring_system epss
scoring_elements 0.41652
published_at 2026-04-18T12:55:00Z
1
value 0.00197
scoring_system epss
scoring_elements 0.41678
published_at 2026-04-16T12:55:00Z
2
value 0.00197
scoring_system epss
scoring_elements 0.41631
published_at 2026-04-13T12:55:00Z
3
value 0.00197
scoring_system epss
scoring_elements 0.41677
published_at 2026-04-11T12:55:00Z
4
value 0.00197
scoring_system epss
scoring_elements 0.41654
published_at 2026-04-09T12:55:00Z
5
value 0.00197
scoring_system epss
scoring_elements 0.41645
published_at 2026-04-12T12:55:00Z
6
value 0.00197
scoring_system epss
scoring_elements 0.41595
published_at 2026-04-07T12:55:00Z
7
value 0.00197
scoring_system epss
scoring_elements 0.41668
published_at 2026-04-04T12:55:00Z
8
value 0.00206
scoring_system epss
scoring_elements 0.42968
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-55173
2
reference_url https://github.com/vercel/next.js
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/vercel/next.js
3
reference_url https://github.com/vercel/next.js/commit/6b12c60c61ee80cb0443ccd20de82ca9b4422ddd
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-02T19:22:48Z/
url https://github.com/vercel/next.js/commit/6b12c60c61ee80cb0443ccd20de82ca9b4422ddd
4
reference_url https://github.com/vercel/next.js/security/advisories/GHSA-xv57-4mr9-wg8v
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-02T19:22:48Z/
url https://github.com/vercel/next.js/security/advisories/GHSA-xv57-4mr9-wg8v
5
reference_url https://nvd.nist.gov/vuln/detail/CVE-2025-55173
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2025-55173
6
reference_url https://vercel.com/changelog/cve-2025-55173
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-02T19:22:48Z/
url https://vercel.com/changelog/cve-2025-55173
7
reference_url http://vercel.com/changelog/cve-2025-55173
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url http://vercel.com/changelog/cve-2025-55173
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2392059
reference_id 2392059
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2392059
9
reference_url https://github.com/advisories/GHSA-xv57-4mr9-wg8v
reference_id GHSA-xv57-4mr9-wg8v
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-xv57-4mr9-wg8v
fixed_packages
0
url pkg:npm/next@14.2.31
purl pkg:npm/next@14.2.31
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1qzn-gxkv-wye3
1
vulnerability VCID-54qu-9bx2-9ka8
2
vulnerability VCID-5kj1-stm6-8qgv
3
vulnerability VCID-fpzm-tpp7-jbft
4
vulnerability VCID-qz2s-22e2-ufg9
5
vulnerability VCID-w35n-bwuy-5kce
6
vulnerability VCID-xv6q-hbf8-b7b1
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/next@14.2.31
1
url pkg:npm/next@15.4.5
purl pkg:npm/next@15.4.5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1qzn-gxkv-wye3
1
vulnerability VCID-2tah-y5sg-hugp
2
vulnerability VCID-3m4d-v2y1-5ua4
3
vulnerability VCID-54qu-9bx2-9ka8
4
vulnerability VCID-5kj1-stm6-8qgv
5
vulnerability VCID-pqwe-3ukm-dkh4
6
vulnerability VCID-qz2s-22e2-ufg9
7
vulnerability VCID-w35n-bwuy-5kce
8
vulnerability VCID-xv6q-hbf8-b7b1
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/next@15.4.5
aliases CVE-2025-55173, GHSA-xv57-4mr9-wg8v
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sjdx-v2z6-3fcw
9
url VCID-ukfu-ane3-vfch
vulnerability_id VCID-ukfu-ane3-vfch
summary
Next.js authorization bypass vulnerability
### Impact
If a Next.js application is performing authorization in middleware based on pathname, it was possible for this authorization to be bypassed.

### Patches
This issue was patched in Next.js `14.2.15` and later.

If your Next.js application is hosted on Vercel, this vulnerability has been automatically mitigated, regardless of Next.js version.

### Workarounds
There are no official workarounds for this vulnerability.

#### Credits
We'd like to thank [tyage](http://github.com/tyage) (GMO CyberSecurity by IERAE) for responsible disclosure of this issue.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-51479.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-51479.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-51479
reference_id
reference_type
scores
0
value 0.66731
scoring_system epss
scoring_elements 0.98548
published_at 2026-04-18T12:55:00Z
1
value 0.66731
scoring_system epss
scoring_elements 0.98543
published_at 2026-04-13T12:55:00Z
2
value 0.66731
scoring_system epss
scoring_elements 0.98542
published_at 2026-04-12T12:55:00Z
3
value 0.66731
scoring_system epss
scoring_elements 0.98541
published_at 2026-04-09T12:55:00Z
4
value 0.66731
scoring_system epss
scoring_elements 0.98532
published_at 2026-04-02T12:55:00Z
5
value 0.66731
scoring_system epss
scoring_elements 0.98536
published_at 2026-04-07T12:55:00Z
6
value 0.66731
scoring_system epss
scoring_elements 0.98539
published_at 2026-04-08T12:55:00Z
7
value 0.66731
scoring_system epss
scoring_elements 0.98535
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-51479
2
reference_url https://github.com/vercel/next.js
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/vercel/next.js
3
reference_url https://github.com/vercel/next.js/commit/1c8234eb20bc8afd396b89999a00f06b61d72d7b
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/vercel/next.js/commit/1c8234eb20bc8afd396b89999a00f06b61d72d7b
4
reference_url https://github.com/vercel/next.js/releases/tag/v14.2.15
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-17T20:36:20Z/
url https://github.com/vercel/next.js/releases/tag/v14.2.15
5
reference_url https://github.com/vercel/next.js/security/advisories/GHSA-7gfc-8cq8-jh5f
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
2
value HIGH
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-17T20:36:20Z/
url https://github.com/vercel/next.js/security/advisories/GHSA-7gfc-8cq8-jh5f
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2024-51479
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2024-51479
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2332884
reference_id 2332884
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2332884
8
reference_url https://github.com/advisories/GHSA-7gfc-8cq8-jh5f
reference_id GHSA-7gfc-8cq8-jh5f
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-7gfc-8cq8-jh5f
9
reference_url https://access.redhat.com/errata/RHSA-2025:3807
reference_id RHSA-2025:3807
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3807
fixed_packages
0
url pkg:npm/next@14.2.15
purl pkg:npm/next@14.2.15
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1qzn-gxkv-wye3
1
vulnerability VCID-3szn-4nn4-3fek
2
vulnerability VCID-54qu-9bx2-9ka8
3
vulnerability VCID-5kj1-stm6-8qgv
4
vulnerability VCID-fpzm-tpp7-jbft
5
vulnerability VCID-jst7-263v-1ydx
6
vulnerability VCID-qz2s-22e2-ufg9
7
vulnerability VCID-r4pw-m8mz-xbdq
8
vulnerability VCID-sjdx-v2z6-3fcw
9
vulnerability VCID-ub68-nqch-bkdm
10
vulnerability VCID-vwym-qr5h-fue8
11
vulnerability VCID-w35n-bwuy-5kce
12
vulnerability VCID-xv6q-hbf8-b7b1
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/next@14.2.15
aliases CVE-2024-51479, GHSA-7gfc-8cq8-jh5f
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ukfu-ane3-vfch
10
url VCID-vwym-qr5h-fue8
vulnerability_id VCID-vwym-qr5h-fue8
summary
Next.js Race Condition to Cache Poisoning
**Summary**  
We received a responsible disclosure from Allam Rachid (zhero) for a low-severity race-condition vulnerability in Next.js. This issue only affects the **Pages Router** under certain misconfigurations, causing normal endpoints to serve `pageProps` data instead of standard HTML.

[Learn more here](https://vercel.com/changelog/cve-2025-32421)

**Credit**  
Thank you to **Allam Rachid (zhero)** for the responsible disclosure. This research was rewarded as part of our bug bounty program.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-32421.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-32421.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-32421
reference_id
reference_type
scores
0
value 0.0036
scoring_system epss
scoring_elements 0.58212
published_at 2026-04-18T12:55:00Z
1
value 0.0036
scoring_system epss
scoring_elements 0.58209
published_at 2026-04-16T12:55:00Z
2
value 0.0036
scoring_system epss
scoring_elements 0.58177
published_at 2026-04-13T12:55:00Z
3
value 0.0036
scoring_system epss
scoring_elements 0.58197
published_at 2026-04-12T12:55:00Z
4
value 0.0036
scoring_system epss
scoring_elements 0.5822
published_at 2026-04-11T12:55:00Z
5
value 0.0036
scoring_system epss
scoring_elements 0.58204
published_at 2026-04-09T12:55:00Z
6
value 0.0036
scoring_system epss
scoring_elements 0.58171
published_at 2026-04-04T12:55:00Z
7
value 0.0036
scoring_system epss
scoring_elements 0.582
published_at 2026-04-08T12:55:00Z
8
value 0.0036
scoring_system epss
scoring_elements 0.58146
published_at 2026-04-07T12:55:00Z
9
value 0.0036
scoring_system epss
scoring_elements 0.58151
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-32421
2
reference_url https://github.com/vercel/next.js
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
url https://github.com/vercel/next.js
3
reference_url https://github.com/vercel/next.js/security/advisories/GHSA-qpjv-v59x-3qc4
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value LOW
scoring_system cvssv3.1_qr
scoring_elements
2
value LOW
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T15:40:39Z/
url https://github.com/vercel/next.js/security/advisories/GHSA-qpjv-v59x-3qc4
4
reference_url https://nvd.nist.gov/vuln/detail/CVE-2025-32421
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2025-32421
5
reference_url https://vercel.com/changelog/cve-2025-32421
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T15:40:39Z/
url https://vercel.com/changelog/cve-2025-32421
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2366366
reference_id 2366366
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2366366
7
reference_url https://github.com/advisories/GHSA-qpjv-v59x-3qc4
reference_id GHSA-qpjv-v59x-3qc4
reference_type
scores
0
value LOW
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-qpjv-v59x-3qc4
fixed_packages
0
url pkg:npm/next@14.2.24
purl pkg:npm/next@14.2.24
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1qzn-gxkv-wye3
1
vulnerability VCID-54qu-9bx2-9ka8
2
vulnerability VCID-5kj1-stm6-8qgv
3
vulnerability VCID-fpzm-tpp7-jbft
4
vulnerability VCID-jst7-263v-1ydx
5
vulnerability VCID-qz2s-22e2-ufg9
6
vulnerability VCID-r4pw-m8mz-xbdq
7
vulnerability VCID-sjdx-v2z6-3fcw
8
vulnerability VCID-ub68-nqch-bkdm
9
vulnerability VCID-w35n-bwuy-5kce
10
vulnerability VCID-xv6q-hbf8-b7b1
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/next@14.2.24
1
url pkg:npm/next@15.1.6
purl pkg:npm/next@15.1.6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1qzn-gxkv-wye3
1
vulnerability VCID-2tah-y5sg-hugp
2
vulnerability VCID-3m4d-v2y1-5ua4
3
vulnerability VCID-54qu-9bx2-9ka8
4
vulnerability VCID-5kj1-stm6-8qgv
5
vulnerability VCID-dyak-ybr6-fyhy
6
vulnerability VCID-jst7-263v-1ydx
7
vulnerability VCID-pqwe-3ukm-dkh4
8
vulnerability VCID-qz2s-22e2-ufg9
9
vulnerability VCID-r4pw-m8mz-xbdq
10
vulnerability VCID-sjdx-v2z6-3fcw
11
vulnerability VCID-ub68-nqch-bkdm
12
vulnerability VCID-w35n-bwuy-5kce
13
vulnerability VCID-xv6q-hbf8-b7b1
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/next@15.1.6
aliases CVE-2025-32421, GHSA-qpjv-v59x-3qc4
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vwym-qr5h-fue8
11
url VCID-xv6q-hbf8-b7b1
vulnerability_id VCID-xv6q-hbf8-b7b1
summary
Next.js self-hosted applications vulnerable to DoS via Image Optimizer remotePatterns configuration
A DoS vulnerability exists in self-hosted Next.js applications that have `remotePatterns` configured for the Image Optimizer. The image optimization endpoint (`/_next/image`) loads external images entirely into memory without enforcing a maximum size limit, allowing an attacker to cause out-of-memory conditions by requesting optimization of arbitrarily large images. This vulnerability requires that `remotePatterns` is configured to allow image optimization from external domains and that the attacker can serve or control a large image on an allowed domain.

Strongly consider upgrading to 15.5.10 and 16.1.5 to reduce risk and prevent availability issues in Next applications.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-59471.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-59471.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-59471
reference_id
reference_type
scores
0
value 0.00026
scoring_system epss
scoring_elements 0.07214
published_at 2026-04-02T12:55:00Z
1
value 0.00027
scoring_system epss
scoring_elements 0.07621
published_at 2026-04-18T12:55:00Z
2
value 0.00027
scoring_system epss
scoring_elements 0.07692
published_at 2026-04-04T12:55:00Z
3
value 0.00027
scoring_system epss
scoring_elements 0.07661
published_at 2026-04-07T12:55:00Z
4
value 0.00027
scoring_system epss
scoring_elements 0.07721
published_at 2026-04-08T12:55:00Z
5
value 0.00027
scoring_system epss
scoring_elements 0.07739
published_at 2026-04-09T12:55:00Z
6
value 0.00027
scoring_system epss
scoring_elements 0.07738
published_at 2026-04-11T12:55:00Z
7
value 0.00027
scoring_system epss
scoring_elements 0.07724
published_at 2026-04-12T12:55:00Z
8
value 0.00027
scoring_system epss
scoring_elements 0.07708
published_at 2026-04-13T12:55:00Z
9
value 0.00027
scoring_system epss
scoring_elements 0.07633
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-59471
2
reference_url https://github.com/vercel/next.js
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/vercel/next.js
3
reference_url https://github.com/vercel/next.js/commit/500ec83743639addceaede95e95913398975156c
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/vercel/next.js/commit/500ec83743639addceaede95e95913398975156c
4
reference_url https://github.com/vercel/next.js/commit/e5b834d208fe0edf64aa26b5d76dcf6a176500ec
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/vercel/next.js/commit/e5b834d208fe0edf64aa26b5d76dcf6a176500ec
5
reference_url https://github.com/vercel/next.js/releases/tag/v15.5.10
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/vercel/next.js/releases/tag/v15.5.10
6
reference_url https://github.com/vercel/next.js/releases/tag/v16.1.5
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/vercel/next.js/releases/tag/v16.1.5
7
reference_url https://github.com/vercel/next.js/security/advisories/GHSA-9g9p-9gw9-jx7f
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-27T14:54:47Z/
url https://github.com/vercel/next.js/security/advisories/GHSA-9g9p-9gw9-jx7f
8
reference_url https://nvd.nist.gov/vuln/detail/CVE-2025-59471
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2025-59471
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2433094
reference_id 2433094
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2433094
10
reference_url https://github.com/advisories/GHSA-9g9p-9gw9-jx7f
reference_id GHSA-9g9p-9gw9-jx7f
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-9g9p-9gw9-jx7f
fixed_packages
0
url pkg:npm/next@15.5.10
purl pkg:npm/next@15.5.10
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3m4d-v2y1-5ua4
1
vulnerability VCID-5kj1-stm6-8qgv
2
vulnerability VCID-qz2s-22e2-ufg9
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/next@15.5.10
1
url pkg:npm/next@16.1.5
purl pkg:npm/next@16.1.5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5kj1-stm6-8qgv
1
vulnerability VCID-6rmp-13nt-2kb9
2
vulnerability VCID-7skv-ksvn-f7bu
3
vulnerability VCID-qz2s-22e2-ufg9
4
vulnerability VCID-wa6u-pkgn-cbaf
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/next@16.1.5
aliases CVE-2025-59471, GHSA-9g9p-9gw9-jx7f
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xv6q-hbf8-b7b1
Fixing_vulnerabilities
Risk_score4.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:npm/next@11.1.3-canary.101