Lookup for vulnerable packages by Package URL.

Purlpkg:npm/next@13.4.5-canary.12
Typenpm
Namespace
Namenext
Version13.4.5-canary.12
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version15.5.14
Latest_non_vulnerable_version16.2.3
Affected_by_vulnerabilities
0
url VCID-1qzn-gxkv-wye3
vulnerability_id VCID-1qzn-gxkv-wye3
summary
Next Vulnerable to Denial of Service with Server Components
A vulnerability affects certain React packages for versions 19.0.0, 19.0.1, 19.1.0, 19.1.1, 19.1.2, 19.2.0, and 19.2.1 and frameworks that use the affected packages, including Next.js 15.x and 16.x using the App Router. The issue is tracked upstream as [CVE-2025-55184](https://www.cve.org/CVERecord?id=CVE-2025-55184).

A malicious HTTP request can be crafted and sent to any App Router endpoint that, when deserialized, can cause the server process to hang and consume CPU. This can result in denial of service in unpatched environments.
references
0
reference_url https://github.com/vercel/next.js
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/vercel/next.js
1
reference_url https://nextjs.org/blog/security-update-2025-12-11
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nextjs.org/blog/security-update-2025-12-11
2
reference_url https://www.cve.org/CVERecord?id=CVE-2025-55184
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.cve.org/CVERecord?id=CVE-2025-55184
3
reference_url https://github.com/advisories/GHSA-mwv6-3258-q52c
reference_id GHSA-mwv6-3258-q52c
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-mwv6-3258-q52c
4
reference_url https://github.com/vercel/next.js/security/advisories/GHSA-mwv6-3258-q52c
reference_id GHSA-mwv6-3258-q52c
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/vercel/next.js/security/advisories/GHSA-mwv6-3258-q52c
fixed_packages
0
url pkg:npm/next@14.2.34
purl pkg:npm/next@14.2.34
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5kj1-stm6-8qgv
1
vulnerability VCID-fpzm-tpp7-jbft
2
vulnerability VCID-qz2s-22e2-ufg9
3
vulnerability VCID-w35n-bwuy-5kce
4
vulnerability VCID-xv6q-hbf8-b7b1
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/next@14.2.34
1
url pkg:npm/next@14.3.0-canary.0
purl pkg:npm/next@14.3.0-canary.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5kj1-stm6-8qgv
1
vulnerability VCID-qz2s-22e2-ufg9
2
vulnerability VCID-w35n-bwuy-5kce
3
vulnerability VCID-xv6q-hbf8-b7b1
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/next@14.3.0-canary.0
2
url pkg:npm/next@15.0.6
purl pkg:npm/next@15.0.6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3m4d-v2y1-5ua4
1
vulnerability VCID-5kj1-stm6-8qgv
2
vulnerability VCID-fpzm-tpp7-jbft
3
vulnerability VCID-qz2s-22e2-ufg9
4
vulnerability VCID-w35n-bwuy-5kce
5
vulnerability VCID-xv6q-hbf8-b7b1
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/next@15.0.6
3
url pkg:npm/next@15.1.0
purl pkg:npm/next@15.1.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3m4d-v2y1-5ua4
1
vulnerability VCID-3szn-4nn4-3fek
2
vulnerability VCID-54qu-9bx2-9ka8
3
vulnerability VCID-5kj1-stm6-8qgv
4
vulnerability VCID-dyak-ybr6-fyhy
5
vulnerability VCID-jst7-263v-1ydx
6
vulnerability VCID-pqwe-3ukm-dkh4
7
vulnerability VCID-qz2s-22e2-ufg9
8
vulnerability VCID-r4pw-m8mz-xbdq
9
vulnerability VCID-sjdx-v2z6-3fcw
10
vulnerability VCID-ub68-nqch-bkdm
11
vulnerability VCID-vwym-qr5h-fue8
12
vulnerability VCID-xv6q-hbf8-b7b1
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/next@15.1.0
4
url pkg:npm/next@15.1.10
purl pkg:npm/next@15.1.10
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3m4d-v2y1-5ua4
1
vulnerability VCID-5kj1-stm6-8qgv
2
vulnerability VCID-fpzm-tpp7-jbft
3
vulnerability VCID-qz2s-22e2-ufg9
4
vulnerability VCID-w35n-bwuy-5kce
5
vulnerability VCID-xv6q-hbf8-b7b1
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/next@15.1.10
5
url pkg:npm/next@15.2.7
purl pkg:npm/next@15.2.7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3m4d-v2y1-5ua4
1
vulnerability VCID-5kj1-stm6-8qgv
2
vulnerability VCID-fpzm-tpp7-jbft
3
vulnerability VCID-qz2s-22e2-ufg9
4
vulnerability VCID-w35n-bwuy-5kce
5
vulnerability VCID-xv6q-hbf8-b7b1
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/next@15.2.7
6
url pkg:npm/next@15.3.7
purl pkg:npm/next@15.3.7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3m4d-v2y1-5ua4
1
vulnerability VCID-5kj1-stm6-8qgv
2
vulnerability VCID-fpzm-tpp7-jbft
3
vulnerability VCID-qz2s-22e2-ufg9
4
vulnerability VCID-w35n-bwuy-5kce
5
vulnerability VCID-xv6q-hbf8-b7b1
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/next@15.3.7
7
url pkg:npm/next@15.4.9
purl pkg:npm/next@15.4.9
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3m4d-v2y1-5ua4
1
vulnerability VCID-5kj1-stm6-8qgv
2
vulnerability VCID-fpzm-tpp7-jbft
3
vulnerability VCID-qz2s-22e2-ufg9
4
vulnerability VCID-w35n-bwuy-5kce
5
vulnerability VCID-xv6q-hbf8-b7b1
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/next@15.4.9
8
url pkg:npm/next@15.5.0
purl pkg:npm/next@15.5.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3m4d-v2y1-5ua4
1
vulnerability VCID-5kj1-stm6-8qgv
2
vulnerability VCID-pqwe-3ukm-dkh4
3
vulnerability VCID-qz2s-22e2-ufg9
4
vulnerability VCID-xv6q-hbf8-b7b1
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/next@15.5.0
9
url pkg:npm/next@15.5.8
purl pkg:npm/next@15.5.8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3m4d-v2y1-5ua4
1
vulnerability VCID-5kj1-stm6-8qgv
2
vulnerability VCID-fpzm-tpp7-jbft
3
vulnerability VCID-qz2s-22e2-ufg9
4
vulnerability VCID-w35n-bwuy-5kce
5
vulnerability VCID-xv6q-hbf8-b7b1
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/next@15.5.8
10
url pkg:npm/next@15.6.0-canary.59
purl pkg:npm/next@15.6.0-canary.59
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3m4d-v2y1-5ua4
1
vulnerability VCID-fpzm-tpp7-jbft
2
vulnerability VCID-w35n-bwuy-5kce
3
vulnerability VCID-xv6q-hbf8-b7b1
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/next@15.6.0-canary.59
11
url pkg:npm/next@16.0.9
purl pkg:npm/next@16.0.9
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3m4d-v2y1-5ua4
1
vulnerability VCID-5kj1-stm6-8qgv
2
vulnerability VCID-6rmp-13nt-2kb9
3
vulnerability VCID-7skv-ksvn-f7bu
4
vulnerability VCID-fpzm-tpp7-jbft
5
vulnerability VCID-qz2s-22e2-ufg9
6
vulnerability VCID-w35n-bwuy-5kce
7
vulnerability VCID-wa6u-pkgn-cbaf
8
vulnerability VCID-xv6q-hbf8-b7b1
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/next@16.0.9
12
url pkg:npm/next@16.1.0-canary.17
purl pkg:npm/next@16.1.0-canary.17
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3m4d-v2y1-5ua4
1
vulnerability VCID-5kj1-stm6-8qgv
2
vulnerability VCID-6rmp-13nt-2kb9
3
vulnerability VCID-7skv-ksvn-f7bu
4
vulnerability VCID-fpzm-tpp7-jbft
5
vulnerability VCID-qz2s-22e2-ufg9
6
vulnerability VCID-w35n-bwuy-5kce
7
vulnerability VCID-wa6u-pkgn-cbaf
8
vulnerability VCID-xv6q-hbf8-b7b1
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/next@16.1.0-canary.17
aliases GHSA-mwv6-3258-q52c
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1qzn-gxkv-wye3
1
url VCID-3szn-4nn4-3fek
vulnerability_id VCID-3szn-4nn4-3fek
summary
Next.js Allows a Denial of Service (DoS) with Server Actions
### Impact
A Denial of Service (DoS) attack allows attackers to construct requests that leaves requests to Server Actions hanging until the hosting provider cancels the function execution.

_Note: Next.js server is idle during that time and only keeps the connection open. CPU and memory footprint are low during that time._

Deployments without any protection against long running Server Action invocations are especially vulnerable. Hosting providers like Vercel or Netlify set a default maximum duration on function execution to reduce the risk of excessive billing.

This is the same issue as if the incoming HTTP request has an invalid `Content-Length` header or never closes. If the host has no other mitigations to those then this vulnerability is novel.

This vulnerability affects only Next.js deployments using Server Actions.

### Patches

This vulnerability was resolved in Next.js 14.2.21, 15.1.2, and 13.5.8. We recommend that users upgrade to a safe version.

### Workarounds

There are no official workarounds for this vulnerability.

### Credits

Thanks to the PackDraw team for responsibly disclosing this vulnerability.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-56332.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-56332.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-56332
reference_id
reference_type
scores
0
value 0.00339
scoring_system epss
scoring_elements 0.56726
published_at 2026-04-18T12:55:00Z
1
value 0.00339
scoring_system epss
scoring_elements 0.56728
published_at 2026-04-16T12:55:00Z
2
value 0.00339
scoring_system epss
scoring_elements 0.56698
published_at 2026-04-13T12:55:00Z
3
value 0.00339
scoring_system epss
scoring_elements 0.56718
published_at 2026-04-12T12:55:00Z
4
value 0.00339
scoring_system epss
scoring_elements 0.56678
published_at 2026-04-07T12:55:00Z
5
value 0.00339
scoring_system epss
scoring_elements 0.56735
published_at 2026-04-09T12:55:00Z
6
value 0.00339
scoring_system epss
scoring_elements 0.5673
published_at 2026-04-08T12:55:00Z
7
value 0.00339
scoring_system epss
scoring_elements 0.56743
published_at 2026-04-11T12:55:00Z
8
value 0.00339
scoring_system epss
scoring_elements 0.56679
published_at 2026-04-02T12:55:00Z
9
value 0.00339
scoring_system epss
scoring_elements 0.567
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-56332
2
reference_url https://github.com/vercel/next.js
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/vercel/next.js
3
reference_url https://github.com/vercel/next.js/security/advisories/GHSA-7m27-7ghc-44w9
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-03T20:50:53Z/
url https://github.com/vercel/next.js/security/advisories/GHSA-7m27-7ghc-44w9
4
reference_url https://nvd.nist.gov/vuln/detail/CVE-2024-56332
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2024-56332
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2335479
reference_id 2335479
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2335479
6
reference_url https://github.com/advisories/GHSA-7m27-7ghc-44w9
reference_id GHSA-7m27-7ghc-44w9
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-7m27-7ghc-44w9
7
reference_url https://access.redhat.com/errata/RHSA-2025:3807
reference_id RHSA-2025:3807
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3807
fixed_packages
0
url pkg:npm/next@13.5.8
purl pkg:npm/next@13.5.8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1qzn-gxkv-wye3
1
vulnerability VCID-54qu-9bx2-9ka8
2
vulnerability VCID-5kj1-stm6-8qgv
3
vulnerability VCID-fpzm-tpp7-jbft
4
vulnerability VCID-jst7-263v-1ydx
5
vulnerability VCID-qz2s-22e2-ufg9
6
vulnerability VCID-r4pw-m8mz-xbdq
7
vulnerability VCID-sjdx-v2z6-3fcw
8
vulnerability VCID-ub68-nqch-bkdm
9
vulnerability VCID-vwym-qr5h-fue8
10
vulnerability VCID-w35n-bwuy-5kce
11
vulnerability VCID-xv6q-hbf8-b7b1
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/next@13.5.8
1
url pkg:npm/next@14.2.21
purl pkg:npm/next@14.2.21
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1qzn-gxkv-wye3
1
vulnerability VCID-54qu-9bx2-9ka8
2
vulnerability VCID-5kj1-stm6-8qgv
3
vulnerability VCID-fpzm-tpp7-jbft
4
vulnerability VCID-jst7-263v-1ydx
5
vulnerability VCID-qz2s-22e2-ufg9
6
vulnerability VCID-r4pw-m8mz-xbdq
7
vulnerability VCID-sjdx-v2z6-3fcw
8
vulnerability VCID-ub68-nqch-bkdm
9
vulnerability VCID-vwym-qr5h-fue8
10
vulnerability VCID-w35n-bwuy-5kce
11
vulnerability VCID-xv6q-hbf8-b7b1
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/next@14.2.21
2
url pkg:npm/next@15.1.2
purl pkg:npm/next@15.1.2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1qzn-gxkv-wye3
1
vulnerability VCID-2tah-y5sg-hugp
2
vulnerability VCID-3m4d-v2y1-5ua4
3
vulnerability VCID-54qu-9bx2-9ka8
4
vulnerability VCID-5kj1-stm6-8qgv
5
vulnerability VCID-dyak-ybr6-fyhy
6
vulnerability VCID-jst7-263v-1ydx
7
vulnerability VCID-pqwe-3ukm-dkh4
8
vulnerability VCID-qz2s-22e2-ufg9
9
vulnerability VCID-r4pw-m8mz-xbdq
10
vulnerability VCID-sjdx-v2z6-3fcw
11
vulnerability VCID-ub68-nqch-bkdm
12
vulnerability VCID-vwym-qr5h-fue8
13
vulnerability VCID-w35n-bwuy-5kce
14
vulnerability VCID-xv6q-hbf8-b7b1
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/next@15.1.2
aliases CVE-2024-56332, GHSA-7m27-7ghc-44w9
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3szn-4nn4-3fek
2
url VCID-54qu-9bx2-9ka8
vulnerability_id VCID-54qu-9bx2-9ka8
summary
Next.js Improper Middleware Redirect Handling Leads to SSRF
A vulnerability in **Next.js Middleware** has been fixed in **v14.2.32** and **v15.4.7**. The issue occurred when request headers were directly passed into `NextResponse.next()`. In self-hosted applications, this could allow Server-Side Request Forgery (SSRF) if certain sensitive headers from the incoming request were reflected back into the response.

All users implementing custom middleware logic in self-hosted environments are strongly encouraged to upgrade and verify correct usage of the `next()` function.

More details at [Vercel Changelog](https://vercel.com/changelog/cve-2025-57822)
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-57822
reference_id
reference_type
scores
0
value 0.05626
scoring_system epss
scoring_elements 0.90314
published_at 2026-04-04T12:55:00Z
1
value 0.05626
scoring_system epss
scoring_elements 0.90357
published_at 2026-04-18T12:55:00Z
2
value 0.05626
scoring_system epss
scoring_elements 0.90341
published_at 2026-04-13T12:55:00Z
3
value 0.05626
scoring_system epss
scoring_elements 0.90348
published_at 2026-04-12T12:55:00Z
4
value 0.05626
scoring_system epss
scoring_elements 0.9034
published_at 2026-04-09T12:55:00Z
5
value 0.05626
scoring_system epss
scoring_elements 0.90333
published_at 2026-04-08T12:55:00Z
6
value 0.05626
scoring_system epss
scoring_elements 0.90319
published_at 2026-04-07T12:55:00Z
7
value 0.05626
scoring_system epss
scoring_elements 0.90302
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-57822
1
reference_url https://github.com/vercel/next.js
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/vercel/next.js
2
reference_url https://github.com/vercel/next.js/commit/9c9aaed5bb9338ef31b0517ccf0ab4414f2093d8
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-02T17:26:15Z/
url https://github.com/vercel/next.js/commit/9c9aaed5bb9338ef31b0517ccf0ab4414f2093d8
3
reference_url https://github.com/vercel/next.js/security/advisories/GHSA-4342-x723-ch2f
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N
1
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-02T17:26:15Z/
url https://github.com/vercel/next.js/security/advisories/GHSA-4342-x723-ch2f
4
reference_url https://nvd.nist.gov/vuln/detail/CVE-2025-57822
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2025-57822
5
reference_url https://vercel.com/changelog/cve-2025-57822
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-02T17:26:15Z/
url https://vercel.com/changelog/cve-2025-57822
6
reference_url https://github.com/advisories/GHSA-4342-x723-ch2f
reference_id GHSA-4342-x723-ch2f
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-4342-x723-ch2f
fixed_packages
0
url pkg:npm/next@14.2.32
purl pkg:npm/next@14.2.32
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1qzn-gxkv-wye3
1
vulnerability VCID-5kj1-stm6-8qgv
2
vulnerability VCID-fpzm-tpp7-jbft
3
vulnerability VCID-qz2s-22e2-ufg9
4
vulnerability VCID-w35n-bwuy-5kce
5
vulnerability VCID-xv6q-hbf8-b7b1
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/next@14.2.32
1
url pkg:npm/next@15.4.7
purl pkg:npm/next@15.4.7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1qzn-gxkv-wye3
1
vulnerability VCID-2tah-y5sg-hugp
2
vulnerability VCID-3m4d-v2y1-5ua4
3
vulnerability VCID-5kj1-stm6-8qgv
4
vulnerability VCID-pqwe-3ukm-dkh4
5
vulnerability VCID-qz2s-22e2-ufg9
6
vulnerability VCID-w35n-bwuy-5kce
7
vulnerability VCID-xv6q-hbf8-b7b1
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/next@15.4.7
aliases CVE-2025-57822, GHSA-4342-x723-ch2f
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-54qu-9bx2-9ka8
3
url VCID-5kj1-stm6-8qgv
vulnerability_id VCID-5kj1-stm6-8qgv
summary
Next.js: HTTP request smuggling in rewrites
## Summary
When Next.js rewrites proxy traffic to an external backend, a crafted `DELETE`/`OPTIONS` request using `Transfer-Encoding: chunked` could trigger request boundary disagreement between the proxy and backend. This could allow request smuggling through rewritten routes.

## Impact
An attacker could smuggle a second request to unintended backend routes (for example, internal/admin endpoints), bypassing assumptions that only the configured rewrite destination/path is reachable. This does not impact applications hosted on providers that handle rewrites at the CDN level, such as Vercel. 

## Patches
The vulnerability originated in an upstream library vendored by Next.js. It is fixed by updating that dependency’s behavior so `content-length: 0` is added only when both `content-length` and `transfer-encoding` are absent, and `transfer-encoding` is no longer removed in that code path.

## Workarounds
If upgrade is not immediately possible:
- Block chunked `DELETE`/`OPTIONS` requests on rewritten routes at your edge/proxy.
- Enforce authentication/authorization on backend routes per our [security guidance](https://nextjs.org/docs/app/guides/data-security).
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-29057.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-29057.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-29057
reference_id
reference_type
scores
0
value 0.00063
scoring_system epss
scoring_elements 0.19764
published_at 2026-04-11T12:55:00Z
1
value 0.00063
scoring_system epss
scoring_elements 0.19759
published_at 2026-04-09T12:55:00Z
2
value 0.00063
scoring_system epss
scoring_elements 0.19708
published_at 2026-04-08T12:55:00Z
3
value 0.00063
scoring_system epss
scoring_elements 0.19628
published_at 2026-04-07T12:55:00Z
4
value 0.00073
scoring_system epss
scoring_elements 0.22369
published_at 2026-04-02T12:55:00Z
5
value 0.00073
scoring_system epss
scoring_elements 0.22413
published_at 2026-04-04T12:55:00Z
6
value 0.00083
scoring_system epss
scoring_elements 0.24321
published_at 2026-04-18T12:55:00Z
7
value 0.00083
scoring_system epss
scoring_elements 0.24331
published_at 2026-04-16T12:55:00Z
8
value 0.00083
scoring_system epss
scoring_elements 0.24313
published_at 2026-04-13T12:55:00Z
9
value 0.00083
scoring_system epss
scoring_elements 0.2437
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-29057
2
reference_url https://github.com/vercel/next.js
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/vercel/next.js
3
reference_url https://github.com/vercel/next.js/commit/dc98c04f376c6a1df76ec3e0a2d07edf4abdabd6
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-18T14:47:14Z/
url https://github.com/vercel/next.js/commit/dc98c04f376c6a1df76ec3e0a2d07edf4abdabd6
4
reference_url https://github.com/vercel/next.js/releases/tag/v15.5.13
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-18T14:47:14Z/
url https://github.com/vercel/next.js/releases/tag/v15.5.13
5
reference_url https://github.com/vercel/next.js/releases/tag/v16.1.7
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-18T14:47:14Z/
url https://github.com/vercel/next.js/releases/tag/v16.1.7
6
reference_url https://github.com/vercel/next.js/security/advisories/GHSA-ggv3-7p47-pfv8
reference_id
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
1
value 6.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-18T14:47:14Z/
url https://github.com/vercel/next.js/security/advisories/GHSA-ggv3-7p47-pfv8
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2026-29057
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2026-29057
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2448515
reference_id 2448515
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2448515
9
reference_url https://github.com/advisories/GHSA-ggv3-7p47-pfv8
reference_id GHSA-ggv3-7p47-pfv8
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-ggv3-7p47-pfv8
fixed_packages
0
url pkg:npm/next@15.5.13
purl pkg:npm/next@15.5.13
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-qz2s-22e2-ufg9
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/next@15.5.13
1
url pkg:npm/next@16.1.7
purl pkg:npm/next@16.1.7
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/next@16.1.7
aliases CVE-2026-29057, GHSA-ggv3-7p47-pfv8
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5kj1-stm6-8qgv
4
url VCID-fpzm-tpp7-jbft
vulnerability_id VCID-fpzm-tpp7-jbft
summary
Next has a Denial of Service with Server Components - Incomplete Fix Follow-Up
It was discovered that the fix for [CVE-2025-55184](https://github.com/advisories/GHSA-2m3v-v2m8-q956) in React Server Components was incomplete and did not fully mitigate denial-of-service conditions across all payload types.  As a result, certain crafted inputs could still trigger excessive resource consumption.

This vulnerability affects React versions 19.0.2, 19.1.3, and 19.2.2, as well as frameworks that bundle or depend on these versions, including Next.js 13.x, 14.x, 15.x, and 16.x when using the App Router. The issue is tracked upstream as [CVE-2025-67779](https://www.cve.org/CVERecord?id=CVE-2025-67779).

A malicious actor can send a specially crafted HTTP request to a Server Function endpoint that, when deserialized, causes the React Server Components runtime to enter an infinite loop. This can lead to sustained CPU consumption and cause the affected server process to become unresponsive, resulting in a denial-of-service condition in unpatched environments.
references
0
reference_url https://github.com/vercel/next.js
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/vercel/next.js
1
reference_url https://nextjs.org/blog/security-update-2025-12-11
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nextjs.org/blog/security-update-2025-12-11
2
reference_url https://react.dev/blog/2025/12/11/denial-of-service-and-source-code-exposure-in-react-server-components
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://react.dev/blog/2025/12/11/denial-of-service-and-source-code-exposure-in-react-server-components
3
reference_url https://www.cve.org/CVERecord?id=CVE-2025-55184
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.cve.org/CVERecord?id=CVE-2025-55184
4
reference_url https://nvd.nist.gov/vuln/detail/CVE-2025-67779
reference_id CVE-2025-67779
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2025-67779
5
reference_url https://www.facebook.com/security/advisories/cve-2025-67779
reference_id CVE-2025-67779
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.facebook.com/security/advisories/cve-2025-67779
6
reference_url https://github.com/advisories/GHSA-5j59-xgg2-r9c4
reference_id GHSA-5j59-xgg2-r9c4
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-5j59-xgg2-r9c4
7
reference_url https://github.com/vercel/next.js/security/advisories/GHSA-5j59-xgg2-r9c4
reference_id GHSA-5j59-xgg2-r9c4
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/vercel/next.js/security/advisories/GHSA-5j59-xgg2-r9c4
fixed_packages
0
url pkg:npm/next@14.2.35
purl pkg:npm/next@14.2.35
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5kj1-stm6-8qgv
1
vulnerability VCID-qz2s-22e2-ufg9
2
vulnerability VCID-w35n-bwuy-5kce
3
vulnerability VCID-xv6q-hbf8-b7b1
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/next@14.2.35
1
url pkg:npm/next@15.0.7
purl pkg:npm/next@15.0.7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3m4d-v2y1-5ua4
1
vulnerability VCID-5kj1-stm6-8qgv
2
vulnerability VCID-qz2s-22e2-ufg9
3
vulnerability VCID-w35n-bwuy-5kce
4
vulnerability VCID-xv6q-hbf8-b7b1
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/next@15.0.7
2
url pkg:npm/next@15.1.11
purl pkg:npm/next@15.1.11
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3m4d-v2y1-5ua4
1
vulnerability VCID-5kj1-stm6-8qgv
2
vulnerability VCID-qz2s-22e2-ufg9
3
vulnerability VCID-w35n-bwuy-5kce
4
vulnerability VCID-xv6q-hbf8-b7b1
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/next@15.1.11
3
url pkg:npm/next@15.2.8
purl pkg:npm/next@15.2.8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3m4d-v2y1-5ua4
1
vulnerability VCID-5kj1-stm6-8qgv
2
vulnerability VCID-qz2s-22e2-ufg9
3
vulnerability VCID-w35n-bwuy-5kce
4
vulnerability VCID-xv6q-hbf8-b7b1
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/next@15.2.8
4
url pkg:npm/next@15.3.8
purl pkg:npm/next@15.3.8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3m4d-v2y1-5ua4
1
vulnerability VCID-5kj1-stm6-8qgv
2
vulnerability VCID-qz2s-22e2-ufg9
3
vulnerability VCID-w35n-bwuy-5kce
4
vulnerability VCID-xv6q-hbf8-b7b1
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/next@15.3.8
5
url pkg:npm/next@15.4.10
purl pkg:npm/next@15.4.10
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3m4d-v2y1-5ua4
1
vulnerability VCID-5kj1-stm6-8qgv
2
vulnerability VCID-qz2s-22e2-ufg9
3
vulnerability VCID-w35n-bwuy-5kce
4
vulnerability VCID-xv6q-hbf8-b7b1
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/next@15.4.10
6
url pkg:npm/next@15.5.9
purl pkg:npm/next@15.5.9
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3m4d-v2y1-5ua4
1
vulnerability VCID-5kj1-stm6-8qgv
2
vulnerability VCID-qz2s-22e2-ufg9
3
vulnerability VCID-w35n-bwuy-5kce
4
vulnerability VCID-xv6q-hbf8-b7b1
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/next@15.5.9
7
url pkg:npm/next@15.6.0-canary.60
purl pkg:npm/next@15.6.0-canary.60
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3m4d-v2y1-5ua4
1
vulnerability VCID-w35n-bwuy-5kce
2
vulnerability VCID-xv6q-hbf8-b7b1
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/next@15.6.0-canary.60
8
url pkg:npm/next@16.0.10
purl pkg:npm/next@16.0.10
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3m4d-v2y1-5ua4
1
vulnerability VCID-5kj1-stm6-8qgv
2
vulnerability VCID-6rmp-13nt-2kb9
3
vulnerability VCID-7skv-ksvn-f7bu
4
vulnerability VCID-qz2s-22e2-ufg9
5
vulnerability VCID-w35n-bwuy-5kce
6
vulnerability VCID-wa6u-pkgn-cbaf
7
vulnerability VCID-xv6q-hbf8-b7b1
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/next@16.0.10
9
url pkg:npm/next@16.1.0-canary.19
purl pkg:npm/next@16.1.0-canary.19
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3m4d-v2y1-5ua4
1
vulnerability VCID-5kj1-stm6-8qgv
2
vulnerability VCID-6rmp-13nt-2kb9
3
vulnerability VCID-7skv-ksvn-f7bu
4
vulnerability VCID-qz2s-22e2-ufg9
5
vulnerability VCID-w35n-bwuy-5kce
6
vulnerability VCID-wa6u-pkgn-cbaf
7
vulnerability VCID-xv6q-hbf8-b7b1
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/next@16.1.0-canary.19
aliases GHSA-5j59-xgg2-r9c4
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fpzm-tpp7-jbft
5
url VCID-fwnm-krm1-6kh6
vulnerability_id VCID-fwnm-krm1-6kh6
summary
Denial of Service condition in Next.js image optimization
### Impact
The image optimization feature of Next.js contained a vulnerability which allowed for a potential Denial of Service (DoS) condition which could lead to excessive CPU consumption.

**Not affected:**
- The `next.config.js` file is configured with `images.unoptimized` set to `true` or `images.loader` set to a non-default value.
- The Next.js application is hosted on Vercel. 

### Patches
This issue was fully patched in Next.js `14.2.7`. We recommend that users upgrade to at least this version.

### Workarounds
Ensure that the `next.config.js` file has either `images.unoptimized`, `images.loader` or `images.loaderFile` assigned.

#### Credits
Brandon Dahler (brandondahler), AWS
Dimitrios Vlastaras
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47831.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47831.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-47831
reference_id
reference_type
scores
0
value 0.01699
scoring_system epss
scoring_elements 0.82319
published_at 2026-04-18T12:55:00Z
1
value 0.01699
scoring_system epss
scoring_elements 0.82284
published_at 2026-04-13T12:55:00Z
2
value 0.01699
scoring_system epss
scoring_elements 0.8229
published_at 2026-04-12T12:55:00Z
3
value 0.01699
scoring_system epss
scoring_elements 0.82296
published_at 2026-04-11T12:55:00Z
4
value 0.01699
scoring_system epss
scoring_elements 0.82277
published_at 2026-04-09T12:55:00Z
5
value 0.01699
scoring_system epss
scoring_elements 0.82247
published_at 2026-04-04T12:55:00Z
6
value 0.01699
scoring_system epss
scoring_elements 0.82269
published_at 2026-04-08T12:55:00Z
7
value 0.01699
scoring_system epss
scoring_elements 0.82242
published_at 2026-04-07T12:55:00Z
8
value 0.01699
scoring_system epss
scoring_elements 0.82227
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-47831
2
reference_url https://github.com/vercel/next.js
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value 4.6
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/vercel/next.js
3
reference_url https://github.com/vercel/next.js/commit/d11cbc9ff0b1aaefabcba9afe1e562e0b1fde65a
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value 4.6
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T14:51:58Z/
url https://github.com/vercel/next.js/commit/d11cbc9ff0b1aaefabcba9afe1e562e0b1fde65a
4
reference_url https://github.com/vercel/next.js/security/advisories/GHSA-g77x-44xx-532m
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
2
value 4.6
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T14:51:58Z/
url https://github.com/vercel/next.js/security/advisories/GHSA-g77x-44xx-532m
5
reference_url https://nvd.nist.gov/vuln/detail/CVE-2024-47831
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value 4.6
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2024-47831
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2318607
reference_id 2318607
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2318607
7
reference_url https://github.com/advisories/GHSA-g77x-44xx-532m
reference_id GHSA-g77x-44xx-532m
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-g77x-44xx-532m
fixed_packages
0
url pkg:npm/next@14.2.7
purl pkg:npm/next@14.2.7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1qzn-gxkv-wye3
1
vulnerability VCID-3szn-4nn4-3fek
2
vulnerability VCID-54qu-9bx2-9ka8
3
vulnerability VCID-5kj1-stm6-8qgv
4
vulnerability VCID-fpzm-tpp7-jbft
5
vulnerability VCID-jst7-263v-1ydx
6
vulnerability VCID-qz2s-22e2-ufg9
7
vulnerability VCID-r4pw-m8mz-xbdq
8
vulnerability VCID-sjdx-v2z6-3fcw
9
vulnerability VCID-ub68-nqch-bkdm
10
vulnerability VCID-ukfu-ane3-vfch
11
vulnerability VCID-v81y-zgg2-8ycf
12
vulnerability VCID-vwym-qr5h-fue8
13
vulnerability VCID-w35n-bwuy-5kce
14
vulnerability VCID-xv6q-hbf8-b7b1
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/next@14.2.7
aliases CVE-2024-47831, GHSA-g77x-44xx-532m
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fwnm-krm1-6kh6
6
url VCID-gxry-99g5-9ubz
vulnerability_id VCID-gxry-99g5-9ubz
summary
Next.js Vulnerable to HTTP Request Smuggling
### Impact
Inconsistent interpretation of a crafted HTTP request meant that requests are treated as both a single request, and two separate requests by Next.js, leading to desynchronized responses. This led to a response queue poisoning vulnerability in the affected Next.js versions.

For a request to be exploitable, the affected route also had to be making use of the [rewrites](https://nextjs.org/docs/app/api-reference/next-config-js/rewrites) feature in Next.js.

### Patches
The vulnerability is resolved in Next.js `13.5.1` and newer. This includes Next.js `14.x`.

### Workarounds
There are no official workarounds for this vulnerability. We recommend that you upgrade to a safe version.

### References
https://portswigger.net/web-security/request-smuggling/advanced/response-queue-poisoning
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-34350
reference_id
reference_type
scores
0
value 0.00888
scoring_system epss
scoring_elements 0.7543
published_at 2026-04-02T12:55:00Z
1
value 0.00888
scoring_system epss
scoring_elements 0.75529
published_at 2026-04-18T12:55:00Z
2
value 0.00888
scoring_system epss
scoring_elements 0.75524
published_at 2026-04-16T12:55:00Z
3
value 0.00888
scoring_system epss
scoring_elements 0.75482
published_at 2026-04-13T12:55:00Z
4
value 0.00888
scoring_system epss
scoring_elements 0.75492
published_at 2026-04-12T12:55:00Z
5
value 0.00888
scoring_system epss
scoring_elements 0.75513
published_at 2026-04-11T12:55:00Z
6
value 0.00888
scoring_system epss
scoring_elements 0.75494
published_at 2026-04-09T12:55:00Z
7
value 0.00888
scoring_system epss
scoring_elements 0.75442
published_at 2026-04-07T12:55:00Z
8
value 0.00888
scoring_system epss
scoring_elements 0.75462
published_at 2026-04-04T12:55:00Z
9
value 0.00888
scoring_system epss
scoring_elements 0.75485
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-34350
1
reference_url https://github.com/vercel/next.js
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/vercel/next.js
2
reference_url https://github.com/vercel/next.js/commit/44eba020c615f0d9efe431f84ada67b81576f3f5
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/vercel/next.js/commit/44eba020c615f0d9efe431f84ada67b81576f3f5
3
reference_url https://github.com/vercel/next.js/compare/v13.5.0...v13.5.1
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/vercel/next.js/compare/v13.5.0...v13.5.1
4
reference_url https://github.com/vercel/next.js/security/advisories/GHSA-77r5-gw3j-2mpf
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:H/A:N
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
2
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
3
value HIGH
scoring_system generic_textual
scoring_elements
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-09T20:02:36Z/
url https://github.com/vercel/next.js/security/advisories/GHSA-77r5-gw3j-2mpf
5
reference_url https://nvd.nist.gov/vuln/detail/CVE-2024-34350
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2024-34350
6
reference_url https://github.com/advisories/GHSA-77r5-gw3j-2mpf
reference_id GHSA-77r5-gw3j-2mpf
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-77r5-gw3j-2mpf
fixed_packages
0
url pkg:npm/next@13.5.1
purl pkg:npm/next@13.5.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1qzn-gxkv-wye3
1
vulnerability VCID-3szn-4nn4-3fek
2
vulnerability VCID-54qu-9bx2-9ka8
3
vulnerability VCID-5kj1-stm6-8qgv
4
vulnerability VCID-fpzm-tpp7-jbft
5
vulnerability VCID-fwnm-krm1-6kh6
6
vulnerability VCID-jst7-263v-1ydx
7
vulnerability VCID-qz2s-22e2-ufg9
8
vulnerability VCID-r4pw-m8mz-xbdq
9
vulnerability VCID-sjdx-v2z6-3fcw
10
vulnerability VCID-ub68-nqch-bkdm
11
vulnerability VCID-ukfu-ane3-vfch
12
vulnerability VCID-v81y-zgg2-8ycf
13
vulnerability VCID-vwym-qr5h-fue8
14
vulnerability VCID-w35n-bwuy-5kce
15
vulnerability VCID-xu9v-gnn9-bfhf
16
vulnerability VCID-xv6q-hbf8-b7b1
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/next@13.5.1
aliases CVE-2024-34350, GHSA-77r5-gw3j-2mpf
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gxry-99g5-9ubz
7
url VCID-hvgn-qbwr-tkbg
vulnerability_id VCID-hvgn-qbwr-tkbg
summary
Next.js Denial of Service (DoS) condition
### Impact
A Denial of Service (DoS) condition was identified in Next.js. Exploitation of the bug can trigger a crash, affecting the availability of the server.

**This vulnerability can affect all Next.js deployments on the affected versions.**

### Patches
This vulnerability was resolved in Next.js 13.5 and later. We recommend that users upgrade to a safe version.

### Workarounds
There are no official workarounds for this vulnerability.

#### Credit
* Thai Vu of [flyseccorp.com](http://flyseccorp.com/)
* Aonan Guan (@0dd), Senior Cloud Security Engineer
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-39693
reference_id
reference_type
scores
0
value 0.00514
scoring_system epss
scoring_elements 0.6653
published_at 2026-04-02T12:55:00Z
1
value 0.00514
scoring_system epss
scoring_elements 0.66616
published_at 2026-04-18T12:55:00Z
2
value 0.00514
scoring_system epss
scoring_elements 0.66598
published_at 2026-04-16T12:55:00Z
3
value 0.00514
scoring_system epss
scoring_elements 0.66563
published_at 2026-04-13T12:55:00Z
4
value 0.00514
scoring_system epss
scoring_elements 0.66595
published_at 2026-04-12T12:55:00Z
5
value 0.00514
scoring_system epss
scoring_elements 0.66607
published_at 2026-04-11T12:55:00Z
6
value 0.00514
scoring_system epss
scoring_elements 0.66588
published_at 2026-04-09T12:55:00Z
7
value 0.00514
scoring_system epss
scoring_elements 0.66574
published_at 2026-04-08T12:55:00Z
8
value 0.00514
scoring_system epss
scoring_elements 0.66527
published_at 2026-04-07T12:55:00Z
9
value 0.00514
scoring_system epss
scoring_elements 0.66554
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-39693
1
reference_url https://github.com/vercel/next.js
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/vercel/next.js
2
reference_url https://github.com/vercel/next.js/security/advisories/GHSA-fq54-2j52-jc42
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
2
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
3
value HIGH
scoring_system generic_textual
scoring_elements
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-11T14:15:26Z/
url https://github.com/vercel/next.js/security/advisories/GHSA-fq54-2j52-jc42
3
reference_url https://nvd.nist.gov/vuln/detail/CVE-2024-39693
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2024-39693
4
reference_url https://github.com/advisories/GHSA-fq54-2j52-jc42
reference_id GHSA-fq54-2j52-jc42
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-fq54-2j52-jc42
fixed_packages
0
url pkg:npm/next@13.5.0
purl pkg:npm/next@13.5.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1qzn-gxkv-wye3
1
vulnerability VCID-3szn-4nn4-3fek
2
vulnerability VCID-54qu-9bx2-9ka8
3
vulnerability VCID-5kj1-stm6-8qgv
4
vulnerability VCID-fpzm-tpp7-jbft
5
vulnerability VCID-fwnm-krm1-6kh6
6
vulnerability VCID-gxry-99g5-9ubz
7
vulnerability VCID-jst7-263v-1ydx
8
vulnerability VCID-qz2s-22e2-ufg9
9
vulnerability VCID-r4pw-m8mz-xbdq
10
vulnerability VCID-sjdx-v2z6-3fcw
11
vulnerability VCID-ub68-nqch-bkdm
12
vulnerability VCID-ukfu-ane3-vfch
13
vulnerability VCID-vwym-qr5h-fue8
14
vulnerability VCID-w35n-bwuy-5kce
15
vulnerability VCID-xu9v-gnn9-bfhf
16
vulnerability VCID-xv6q-hbf8-b7b1
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/next@13.5.0
aliases CVE-2024-39693, GHSA-fq54-2j52-jc42
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hvgn-qbwr-tkbg
8
url VCID-jst7-263v-1ydx
vulnerability_id VCID-jst7-263v-1ydx
summary
Authorization Bypass in Next.js Middleware
# Impact
It is possible to bypass authorization checks within a Next.js application, if the authorization check occurs in middleware.

# Patches
* For Next.js 15.x, this issue is fixed in `15.2.3`
* For Next.js 14.x, this issue is fixed in `14.2.25`
* For Next.js 13.x, this issue is fixed in 13.5.9
* For Next.js 12.x, this issue is fixed in 12.3.5
* For Next.js 11.x, consult the below workaround.

_Note: Next.js deployments hosted on Vercel are automatically protected against this vulnerability._

# Workaround
If patching to a safe version is infeasible, we recommend that you prevent external user requests which contain the `x-middleware-subrequest` header from reaching your Next.js application.

## Credits

- Allam Rachid (zhero;)
- Allam Yasser (inzo_)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-29927.json
reference_id
reference_type
scores
0
value 9.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-29927.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-29927
reference_id
reference_type
scores
0
value 0.92955
scoring_system epss
scoring_elements 0.99777
published_at 2026-04-18T12:55:00Z
1
value 0.92955
scoring_system epss
scoring_elements 0.99776
published_at 2026-04-13T12:55:00Z
2
value 0.92955
scoring_system epss
scoring_elements 0.99775
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-29927
2
reference_url https://github.com/vercel/next.js
reference_id
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/vercel/next.js
3
reference_url https://github.com/vercel/next.js/commit/52a078da3884efe6501613c7834a3d02a91676d2
reference_id
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value CRITICAL
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-08T15:16:38Z/
url https://github.com/vercel/next.js/commit/52a078da3884efe6501613c7834a3d02a91676d2
4
reference_url https://github.com/vercel/next.js/commit/5fd3ae8f8542677c6294f32d18022731eab6fe48
reference_id
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value CRITICAL
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-08T15:16:38Z/
url https://github.com/vercel/next.js/commit/5fd3ae8f8542677c6294f32d18022731eab6fe48
5
reference_url https://github.com/vercel/next.js/releases/tag/v12.3.5
reference_id
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value CRITICAL
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-08T15:16:38Z/
url https://github.com/vercel/next.js/releases/tag/v12.3.5
6
reference_url https://github.com/vercel/next.js/releases/tag/v13.5.9
reference_id
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value CRITICAL
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-08T15:16:38Z/
url https://github.com/vercel/next.js/releases/tag/v13.5.9
7
reference_url https://github.com/vercel/next.js/security/advisories/GHSA-f82v-jwr5-mffw
reference_id
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value CRITICAL
scoring_system cvssv3.1_qr
scoring_elements
2
value CRITICAL
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-08T15:16:38Z/
url https://github.com/vercel/next.js/security/advisories/GHSA-f82v-jwr5-mffw
8
reference_url https://nvd.nist.gov/vuln/detail/CVE-2025-29927
reference_id
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2025-29927
9
reference_url https://security.netapp.com/advisory/ntap-20250328-0002
reference_id
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20250328-0002
10
reference_url https://vercel.com/changelog/vercel-firewall-proactively-protects-against-vulnerability-with-middleware
reference_id
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://vercel.com/changelog/vercel-firewall-proactively-protects-against-vulnerability-with-middleware
11
reference_url http://www.openwall.com/lists/oss-security/2025/03/23/3
reference_id
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2025/03/23/3
12
reference_url http://www.openwall.com/lists/oss-security/2025/03/23/4
reference_id
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2025/03/23/4
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2354069
reference_id 2354069
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2354069
14
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/webapps/52124.txt
reference_id CVE-2025-29927
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/webapps/52124.txt
fixed_packages
0
url pkg:npm/next@13.5.9
purl pkg:npm/next@13.5.9
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1qzn-gxkv-wye3
1
vulnerability VCID-28bf-gpk3-xbh8
2
vulnerability VCID-54qu-9bx2-9ka8
3
vulnerability VCID-5kj1-stm6-8qgv
4
vulnerability VCID-fpzm-tpp7-jbft
5
vulnerability VCID-qz2s-22e2-ufg9
6
vulnerability VCID-r4pw-m8mz-xbdq
7
vulnerability VCID-sjdx-v2z6-3fcw
8
vulnerability VCID-ub68-nqch-bkdm
9
vulnerability VCID-vwym-qr5h-fue8
10
vulnerability VCID-w35n-bwuy-5kce
11
vulnerability VCID-xv6q-hbf8-b7b1
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/next@13.5.9
1
url pkg:npm/next@14.0.0
purl pkg:npm/next@14.0.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1qzn-gxkv-wye3
1
vulnerability VCID-3szn-4nn4-3fek
2
vulnerability VCID-54qu-9bx2-9ka8
3
vulnerability VCID-5kj1-stm6-8qgv
4
vulnerability VCID-fpzm-tpp7-jbft
5
vulnerability VCID-fwnm-krm1-6kh6
6
vulnerability VCID-jst7-263v-1ydx
7
vulnerability VCID-qz2s-22e2-ufg9
8
vulnerability VCID-r4pw-m8mz-xbdq
9
vulnerability VCID-sjdx-v2z6-3fcw
10
vulnerability VCID-ub68-nqch-bkdm
11
vulnerability VCID-ukfu-ane3-vfch
12
vulnerability VCID-v81y-zgg2-8ycf
13
vulnerability VCID-vwym-qr5h-fue8
14
vulnerability VCID-w35n-bwuy-5kce
15
vulnerability VCID-xu9v-gnn9-bfhf
16
vulnerability VCID-xv6q-hbf8-b7b1
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/next@14.0.0
2
url pkg:npm/next@14.2.25
purl pkg:npm/next@14.2.25
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1qzn-gxkv-wye3
1
vulnerability VCID-28bf-gpk3-xbh8
2
vulnerability VCID-54qu-9bx2-9ka8
3
vulnerability VCID-5kj1-stm6-8qgv
4
vulnerability VCID-fpzm-tpp7-jbft
5
vulnerability VCID-qz2s-22e2-ufg9
6
vulnerability VCID-r4pw-m8mz-xbdq
7
vulnerability VCID-sjdx-v2z6-3fcw
8
vulnerability VCID-ub68-nqch-bkdm
9
vulnerability VCID-w35n-bwuy-5kce
10
vulnerability VCID-xv6q-hbf8-b7b1
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/next@14.2.25
3
url pkg:npm/next@15.2.3
purl pkg:npm/next@15.2.3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1qzn-gxkv-wye3
1
vulnerability VCID-28bf-gpk3-xbh8
2
vulnerability VCID-2tah-y5sg-hugp
3
vulnerability VCID-3m4d-v2y1-5ua4
4
vulnerability VCID-54qu-9bx2-9ka8
5
vulnerability VCID-5kj1-stm6-8qgv
6
vulnerability VCID-pqwe-3ukm-dkh4
7
vulnerability VCID-qz2s-22e2-ufg9
8
vulnerability VCID-r4pw-m8mz-xbdq
9
vulnerability VCID-sjdx-v2z6-3fcw
10
vulnerability VCID-w35n-bwuy-5kce
11
vulnerability VCID-xv6q-hbf8-b7b1
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/next@15.2.3
aliases CVE-2025-29927, GHSA-f82v-jwr5-mffw
risk_score 10.0
exploitability 2.0
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jst7-263v-1ydx
9
url VCID-qz2s-22e2-ufg9
vulnerability_id VCID-qz2s-22e2-ufg9
summary
Next.js: Unbounded next/image disk cache growth can exhaust storage
## Summary
The default Next.js image optimization disk cache (`/_next/image`) did not have a configurable upper bound, allowing unbounded cache growth.

## Impact
An attacker could generate many unique image-optimization variants and exhaust disk space, causing denial of service. Note that this does not impact platforms that have their own image optimization capabilities, such as Vercel.

## Patches
Fixed by adding an LRU-backed disk cache with `images.maximumDiskCacheSize`, including eviction of least-recently-used entries when the limit is exceeded. Setting `maximumDiskCacheSize: 0` disables disk caching. 

## Workarounds
If upgrade is not immediately possible:
- Periodically clean `.next/cache/images`.
- Reduce variant cardinality (e.g., tighten values for `images.localPatterns`, `images.remotePatterns`, and `images.qualities`)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-27980.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-27980.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-27980
reference_id
reference_type
scores
0
value 0.00018
scoring_system epss
scoring_elements 0.04466
published_at 2026-04-04T12:55:00Z
1
value 0.00018
scoring_system epss
scoring_elements 0.0444
published_at 2026-04-02T12:55:00Z
2
value 0.00021
scoring_system epss
scoring_elements 0.05495
published_at 2026-04-18T12:55:00Z
3
value 0.00021
scoring_system epss
scoring_elements 0.0552
published_at 2026-04-07T12:55:00Z
4
value 0.00021
scoring_system epss
scoring_elements 0.05558
published_at 2026-04-08T12:55:00Z
5
value 0.00021
scoring_system epss
scoring_elements 0.05581
published_at 2026-04-09T12:55:00Z
6
value 0.00021
scoring_system epss
scoring_elements 0.05554
published_at 2026-04-11T12:55:00Z
7
value 0.00021
scoring_system epss
scoring_elements 0.05541
published_at 2026-04-12T12:55:00Z
8
value 0.00021
scoring_system epss
scoring_elements 0.05534
published_at 2026-04-13T12:55:00Z
9
value 0.00021
scoring_system epss
scoring_elements 0.05484
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-27980
2
reference_url https://github.com/vercel/next.js
reference_id
reference_type
scores
0
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/vercel/next.js
3
reference_url https://github.com/vercel/next.js/commit/39eb8e0ac498b48855a0430fbf4c22276a73b4bd
reference_id
reference_type
scores
0
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-18T19:50:06Z/
url https://github.com/vercel/next.js/commit/39eb8e0ac498b48855a0430fbf4c22276a73b4bd
4
reference_url https://github.com/vercel/next.js/releases/tag/v16.1.7
reference_id
reference_type
scores
0
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-18T19:50:06Z/
url https://github.com/vercel/next.js/releases/tag/v16.1.7
5
reference_url https://github.com/vercel/next.js/security/advisories/GHSA-3x4c-7xq6-9pq8
reference_id
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-18T19:50:06Z/
url https://github.com/vercel/next.js/security/advisories/GHSA-3x4c-7xq6-9pq8
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2026-27980
reference_id
reference_type
scores
0
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2026-27980
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2448509
reference_id 2448509
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2448509
8
reference_url https://github.com/advisories/GHSA-3x4c-7xq6-9pq8
reference_id GHSA-3x4c-7xq6-9pq8
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-3x4c-7xq6-9pq8
fixed_packages
0
url pkg:npm/next@15.5.14
purl pkg:npm/next@15.5.14
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/next@15.5.14
1
url pkg:npm/next@15.6.0-canary.0
purl pkg:npm/next@15.6.0-canary.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1qzn-gxkv-wye3
1
vulnerability VCID-2tah-y5sg-hugp
2
vulnerability VCID-3m4d-v2y1-5ua4
3
vulnerability VCID-w35n-bwuy-5kce
4
vulnerability VCID-xv6q-hbf8-b7b1
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/next@15.6.0-canary.0
2
url pkg:npm/next@16.1.7
purl pkg:npm/next@16.1.7
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/next@16.1.7
aliases CVE-2026-27980, GHSA-3x4c-7xq6-9pq8
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qz2s-22e2-ufg9
10
url VCID-r4pw-m8mz-xbdq
vulnerability_id VCID-r4pw-m8mz-xbdq
summary
Next.js Affected by Cache Key Confusion for Image Optimization API Routes
A vulnerability in Next.js Image Optimization has been fixed in v15.4.5 and v14.2.31. When images returned from API routes vary based on request headers (such as `Cookie` or `Authorization`), these responses could be incorrectly cached and served to unauthorized users due to a cache key confusion bug.

All users are encouraged to upgrade if they use API routes to serve images that depend on request headers and have image optimization enabled.

More details at [Vercel Changelog](https://vercel.com/changelog/cve-2025-57752)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-57752.json
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-57752.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-57752
reference_id
reference_type
scores
0
value 0.00063
scoring_system epss
scoring_elements 0.19421
published_at 2026-04-18T12:55:00Z
1
value 0.00063
scoring_system epss
scoring_elements 0.19413
published_at 2026-04-16T12:55:00Z
2
value 0.00063
scoring_system epss
scoring_elements 0.19452
published_at 2026-04-13T12:55:00Z
3
value 0.00063
scoring_system epss
scoring_elements 0.1951
published_at 2026-04-12T12:55:00Z
4
value 0.00063
scoring_system epss
scoring_elements 0.19557
published_at 2026-04-11T12:55:00Z
5
value 0.00063
scoring_system epss
scoring_elements 0.19653
published_at 2026-04-02T12:55:00Z
6
value 0.00063
scoring_system epss
scoring_elements 0.19502
published_at 2026-04-08T12:55:00Z
7
value 0.00063
scoring_system epss
scoring_elements 0.19423
published_at 2026-04-07T12:55:00Z
8
value 0.00063
scoring_system epss
scoring_elements 0.19554
published_at 2026-04-09T12:55:00Z
9
value 0.00063
scoring_system epss
scoring_elements 0.197
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-57752
2
reference_url https://github.com/vercel/next.js
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/vercel/next.js
3
reference_url https://github.com/vercel/next.js/commit/6b12c60c61ee80cb0443ccd20de82ca9b4422ddd
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-02T19:23:30Z/
url https://github.com/vercel/next.js/commit/6b12c60c61ee80cb0443ccd20de82ca9b4422ddd
4
reference_url https://github.com/vercel/next.js/pull/82114
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-02T19:23:30Z/
url https://github.com/vercel/next.js/pull/82114
5
reference_url https://github.com/vercel/next.js/security/advisories/GHSA-g5qg-72qw-gw5v
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-02T19:23:30Z/
url https://github.com/vercel/next.js/security/advisories/GHSA-g5qg-72qw-gw5v
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2025-57752
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2025-57752
7
reference_url https://vercel.com/changelog/cve-2025-57752
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-02T19:23:30Z/
url https://vercel.com/changelog/cve-2025-57752
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2392060
reference_id 2392060
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2392060
9
reference_url https://github.com/advisories/GHSA-g5qg-72qw-gw5v
reference_id GHSA-g5qg-72qw-gw5v
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-g5qg-72qw-gw5v
fixed_packages
0
url pkg:npm/next@14.2.31
purl pkg:npm/next@14.2.31
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1qzn-gxkv-wye3
1
vulnerability VCID-54qu-9bx2-9ka8
2
vulnerability VCID-5kj1-stm6-8qgv
3
vulnerability VCID-fpzm-tpp7-jbft
4
vulnerability VCID-qz2s-22e2-ufg9
5
vulnerability VCID-w35n-bwuy-5kce
6
vulnerability VCID-xv6q-hbf8-b7b1
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/next@14.2.31
1
url pkg:npm/next@15.4.5
purl pkg:npm/next@15.4.5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1qzn-gxkv-wye3
1
vulnerability VCID-2tah-y5sg-hugp
2
vulnerability VCID-3m4d-v2y1-5ua4
3
vulnerability VCID-54qu-9bx2-9ka8
4
vulnerability VCID-5kj1-stm6-8qgv
5
vulnerability VCID-pqwe-3ukm-dkh4
6
vulnerability VCID-qz2s-22e2-ufg9
7
vulnerability VCID-w35n-bwuy-5kce
8
vulnerability VCID-xv6q-hbf8-b7b1
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/next@15.4.5
aliases CVE-2025-57752, GHSA-g5qg-72qw-gw5v
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-r4pw-m8mz-xbdq
11
url VCID-rx4e-7jj2-9udg
vulnerability_id VCID-rx4e-7jj2-9udg
summary
Next.js missing cache-control header may lead to CDN caching empty reply
Next.js before 13.4.20-canary.13 lacks a cache-control header and thus empty prefetch responses may sometimes be cached by a CDN, causing a denial of service to all users requesting the same URL via that CDN.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-46298
reference_id
reference_type
scores
0
value 0.00417
scoring_system epss
scoring_elements 0.6172
published_at 2026-04-07T12:55:00Z
1
value 0.00417
scoring_system epss
scoring_elements 0.61819
published_at 2026-04-18T12:55:00Z
2
value 0.00417
scoring_system epss
scoring_elements 0.61814
published_at 2026-04-16T12:55:00Z
3
value 0.00417
scoring_system epss
scoring_elements 0.61773
published_at 2026-04-13T12:55:00Z
4
value 0.00417
scoring_system epss
scoring_elements 0.61792
published_at 2026-04-12T12:55:00Z
5
value 0.00417
scoring_system epss
scoring_elements 0.61805
published_at 2026-04-11T12:55:00Z
6
value 0.00417
scoring_system epss
scoring_elements 0.61749
published_at 2026-04-04T12:55:00Z
7
value 0.00417
scoring_system epss
scoring_elements 0.61719
published_at 2026-04-02T12:55:00Z
8
value 0.00417
scoring_system epss
scoring_elements 0.61784
published_at 2026-04-09T12:55:00Z
9
value 0.00417
scoring_system epss
scoring_elements 0.61769
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-46298
1
reference_url https://github.com/vercel/next.js
reference_id
reference_type
scores
0
value LOW
scoring_system generic_textual
scoring_elements
url https://github.com/vercel/next.js
2
reference_url https://github.com/vercel/next.js/commit/20d05958ff853e9c9e42139ffec294336881c648
reference_id
reference_type
scores
0
value LOW
scoring_system generic_textual
scoring_elements
url https://github.com/vercel/next.js/commit/20d05958ff853e9c9e42139ffec294336881c648
3
reference_url https://github.com/vercel/next.js/compare/v13.4.20-canary.12...v13.4.20-canary.13
reference_id
reference_type
scores
0
value LOW
scoring_system generic_textual
scoring_elements
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-12T17:50:22Z/
url https://github.com/vercel/next.js/compare/v13.4.20-canary.12...v13.4.20-canary.13
4
reference_url https://github.com/vercel/next.js/issues/45301
reference_id
reference_type
scores
0
value LOW
scoring_system generic_textual
scoring_elements
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-12T17:50:22Z/
url https://github.com/vercel/next.js/issues/45301
5
reference_url https://github.com/vercel/next.js/pull/54732
reference_id
reference_type
scores
0
value LOW
scoring_system generic_textual
scoring_elements
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-12T17:50:22Z/
url https://github.com/vercel/next.js/pull/54732
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2023-46298
reference_id CVE-2023-46298
reference_type
scores
0
value LOW
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2023-46298
7
reference_url https://github.com/advisories/GHSA-c59h-r6p8-q9wc
reference_id GHSA-c59h-r6p8-q9wc
reference_type
scores
0
value LOW
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-c59h-r6p8-q9wc
fixed_packages
0
url pkg:npm/next@13.4.20-canary.0
purl pkg:npm/next@13.4.20-canary.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1qzn-gxkv-wye3
1
vulnerability VCID-3szn-4nn4-3fek
2
vulnerability VCID-54qu-9bx2-9ka8
3
vulnerability VCID-5kj1-stm6-8qgv
4
vulnerability VCID-fpzm-tpp7-jbft
5
vulnerability VCID-fwnm-krm1-6kh6
6
vulnerability VCID-gxry-99g5-9ubz
7
vulnerability VCID-hvgn-qbwr-tkbg
8
vulnerability VCID-jst7-263v-1ydx
9
vulnerability VCID-qz2s-22e2-ufg9
10
vulnerability VCID-r4pw-m8mz-xbdq
11
vulnerability VCID-rx4e-7jj2-9udg
12
vulnerability VCID-sjdx-v2z6-3fcw
13
vulnerability VCID-ub68-nqch-bkdm
14
vulnerability VCID-ukfu-ane3-vfch
15
vulnerability VCID-vwym-qr5h-fue8
16
vulnerability VCID-w35n-bwuy-5kce
17
vulnerability VCID-xu9v-gnn9-bfhf
18
vulnerability VCID-xv6q-hbf8-b7b1
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/next@13.4.20-canary.0
1
url pkg:npm/next@13.4.20-canary.13
purl pkg:npm/next@13.4.20-canary.13
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1qzn-gxkv-wye3
1
vulnerability VCID-3szn-4nn4-3fek
2
vulnerability VCID-54qu-9bx2-9ka8
3
vulnerability VCID-5kj1-stm6-8qgv
4
vulnerability VCID-fpzm-tpp7-jbft
5
vulnerability VCID-fwnm-krm1-6kh6
6
vulnerability VCID-gxry-99g5-9ubz
7
vulnerability VCID-hvgn-qbwr-tkbg
8
vulnerability VCID-jst7-263v-1ydx
9
vulnerability VCID-qz2s-22e2-ufg9
10
vulnerability VCID-r4pw-m8mz-xbdq
11
vulnerability VCID-rx4e-7jj2-9udg
12
vulnerability VCID-sjdx-v2z6-3fcw
13
vulnerability VCID-ub68-nqch-bkdm
14
vulnerability VCID-ukfu-ane3-vfch
15
vulnerability VCID-vwym-qr5h-fue8
16
vulnerability VCID-w35n-bwuy-5kce
17
vulnerability VCID-xu9v-gnn9-bfhf
18
vulnerability VCID-xv6q-hbf8-b7b1
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/next@13.4.20-canary.13
2
url pkg:npm/next@13.5.0
purl pkg:npm/next@13.5.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1qzn-gxkv-wye3
1
vulnerability VCID-3szn-4nn4-3fek
2
vulnerability VCID-54qu-9bx2-9ka8
3
vulnerability VCID-5kj1-stm6-8qgv
4
vulnerability VCID-fpzm-tpp7-jbft
5
vulnerability VCID-fwnm-krm1-6kh6
6
vulnerability VCID-gxry-99g5-9ubz
7
vulnerability VCID-jst7-263v-1ydx
8
vulnerability VCID-qz2s-22e2-ufg9
9
vulnerability VCID-r4pw-m8mz-xbdq
10
vulnerability VCID-sjdx-v2z6-3fcw
11
vulnerability VCID-ub68-nqch-bkdm
12
vulnerability VCID-ukfu-ane3-vfch
13
vulnerability VCID-vwym-qr5h-fue8
14
vulnerability VCID-w35n-bwuy-5kce
15
vulnerability VCID-xu9v-gnn9-bfhf
16
vulnerability VCID-xv6q-hbf8-b7b1
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/next@13.5.0
aliases CVE-2023-46298, GHSA-c59h-r6p8-q9wc
risk_score 1.4
exploitability 0.5
weighted_severity 2.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rx4e-7jj2-9udg
12
url VCID-sjdx-v2z6-3fcw
vulnerability_id VCID-sjdx-v2z6-3fcw
summary
Next.js Content Injection Vulnerability for Image Optimization
A vulnerability in **Next.js Image Optimization** has been fixed in **v15.4.5** and **v14.2.31**. The issue allowed attacker-controlled external image sources to trigger file downloads with arbitrary content and filenames under specific configurations. This behavior could be abused for phishing or malicious file delivery.

All users relying on `images.domains` or `images.remotePatterns` are encouraged to upgrade and verify that external image sources are strictly validated.

More details at [Vercel Changelog](https://vercel.com/changelog/cve-2025-55173)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-55173.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-55173.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-55173
reference_id
reference_type
scores
0
value 0.00197
scoring_system epss
scoring_elements 0.41652
published_at 2026-04-18T12:55:00Z
1
value 0.00197
scoring_system epss
scoring_elements 0.41678
published_at 2026-04-16T12:55:00Z
2
value 0.00197
scoring_system epss
scoring_elements 0.41631
published_at 2026-04-13T12:55:00Z
3
value 0.00197
scoring_system epss
scoring_elements 0.41677
published_at 2026-04-11T12:55:00Z
4
value 0.00197
scoring_system epss
scoring_elements 0.41654
published_at 2026-04-09T12:55:00Z
5
value 0.00197
scoring_system epss
scoring_elements 0.41645
published_at 2026-04-12T12:55:00Z
6
value 0.00197
scoring_system epss
scoring_elements 0.41595
published_at 2026-04-07T12:55:00Z
7
value 0.00197
scoring_system epss
scoring_elements 0.41668
published_at 2026-04-04T12:55:00Z
8
value 0.00206
scoring_system epss
scoring_elements 0.42968
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-55173
2
reference_url https://github.com/vercel/next.js
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/vercel/next.js
3
reference_url https://github.com/vercel/next.js/commit/6b12c60c61ee80cb0443ccd20de82ca9b4422ddd
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-02T19:22:48Z/
url https://github.com/vercel/next.js/commit/6b12c60c61ee80cb0443ccd20de82ca9b4422ddd
4
reference_url https://github.com/vercel/next.js/security/advisories/GHSA-xv57-4mr9-wg8v
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-02T19:22:48Z/
url https://github.com/vercel/next.js/security/advisories/GHSA-xv57-4mr9-wg8v
5
reference_url https://nvd.nist.gov/vuln/detail/CVE-2025-55173
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2025-55173
6
reference_url https://vercel.com/changelog/cve-2025-55173
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-02T19:22:48Z/
url https://vercel.com/changelog/cve-2025-55173
7
reference_url http://vercel.com/changelog/cve-2025-55173
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url http://vercel.com/changelog/cve-2025-55173
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2392059
reference_id 2392059
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2392059
9
reference_url https://github.com/advisories/GHSA-xv57-4mr9-wg8v
reference_id GHSA-xv57-4mr9-wg8v
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-xv57-4mr9-wg8v
fixed_packages
0
url pkg:npm/next@14.2.31
purl pkg:npm/next@14.2.31
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1qzn-gxkv-wye3
1
vulnerability VCID-54qu-9bx2-9ka8
2
vulnerability VCID-5kj1-stm6-8qgv
3
vulnerability VCID-fpzm-tpp7-jbft
4
vulnerability VCID-qz2s-22e2-ufg9
5
vulnerability VCID-w35n-bwuy-5kce
6
vulnerability VCID-xv6q-hbf8-b7b1
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/next@14.2.31
1
url pkg:npm/next@15.4.5
purl pkg:npm/next@15.4.5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1qzn-gxkv-wye3
1
vulnerability VCID-2tah-y5sg-hugp
2
vulnerability VCID-3m4d-v2y1-5ua4
3
vulnerability VCID-54qu-9bx2-9ka8
4
vulnerability VCID-5kj1-stm6-8qgv
5
vulnerability VCID-pqwe-3ukm-dkh4
6
vulnerability VCID-qz2s-22e2-ufg9
7
vulnerability VCID-w35n-bwuy-5kce
8
vulnerability VCID-xv6q-hbf8-b7b1
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/next@15.4.5
aliases CVE-2025-55173, GHSA-xv57-4mr9-wg8v
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sjdx-v2z6-3fcw
13
url VCID-ub68-nqch-bkdm
vulnerability_id VCID-ub68-nqch-bkdm
summary
Information exposure in Next.js dev server due to lack of origin verification
## Summary

A low-severity vulnerability in **Next.js** has been fixed in **version 15.2.2**. This issue may have allowed limited source code exposure when the dev server was running with the App Router enabled. The vulnerability only affects local development environments and requires the user to visit a malicious webpage while `npm run dev` is active.

Because the mitigation is potentially a breaking change for some development setups, to opt-in to the fix, you must configure `allowedDevOrigins` in your next config after upgrading to a patched version. [Learn more](https://nextjs.org/docs/app/api-reference/config/next-config-js/allowedDevOrigins).

Learn more: https://vercel.com/changelog/cve-2025-48068

## Credit

Thanks to [sapphi-red](https://github.com/sapphi-red) and [Radman Siddiki](https://github.com/R4356th) for responsibly disclosing this issue.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-48068.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-48068.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-48068
reference_id
reference_type
scores
0
value 0.00101
scoring_system epss
scoring_elements 0.27809
published_at 2026-04-18T12:55:00Z
1
value 0.00101
scoring_system epss
scoring_elements 0.27831
published_at 2026-04-16T12:55:00Z
2
value 0.00101
scoring_system epss
scoring_elements 0.27823
published_at 2026-04-13T12:55:00Z
3
value 0.00101
scoring_system epss
scoring_elements 0.27924
published_at 2026-04-11T12:55:00Z
4
value 0.00101
scoring_system epss
scoring_elements 0.27923
published_at 2026-04-09T12:55:00Z
5
value 0.00101
scoring_system epss
scoring_elements 0.27882
published_at 2026-04-12T12:55:00Z
6
value 0.00101
scoring_system epss
scoring_elements 0.28024
published_at 2026-04-04T12:55:00Z
7
value 0.00101
scoring_system epss
scoring_elements 0.27982
published_at 2026-04-02T12:55:00Z
8
value 0.00101
scoring_system epss
scoring_elements 0.27815
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-48068
2
reference_url https://github.com/vercel/next.js
reference_id
reference_type
scores
0
value 2.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:L/VI:N/VA:N/SC:L/SI:N/SA:N
1
value LOW
scoring_system generic_textual
scoring_elements
url https://github.com/vercel/next.js
3
reference_url https://github.com/vercel/next.js/security/advisories/GHSA-3h52-269p-cp9r
reference_id
reference_type
scores
0
value LOW
scoring_system cvssv3.1_qr
scoring_elements
1
value 2.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:L/VI:N/VA:N/SC:L/SI:N/SA:N
2
value LOW
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-30T12:43:40Z/
url https://github.com/vercel/next.js/security/advisories/GHSA-3h52-269p-cp9r
4
reference_url https://nvd.nist.gov/vuln/detail/CVE-2025-48068
reference_id
reference_type
scores
0
value 2.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:L/VI:N/VA:N/SC:L/SI:N/SA:N
1
value LOW
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2025-48068
5
reference_url https://vercel.com/changelog/cve-2025-48068
reference_id
reference_type
scores
0
value 2.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:L/VI:N/VA:N/SC:L/SI:N/SA:N
1
value LOW
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-30T12:43:40Z/
url https://vercel.com/changelog/cve-2025-48068
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2369320
reference_id 2369320
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2369320
7
reference_url https://github.com/advisories/GHSA-3h52-269p-cp9r
reference_id GHSA-3h52-269p-cp9r
reference_type
scores
0
value LOW
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-3h52-269p-cp9r
fixed_packages
0
url pkg:npm/next@14.2.30
purl pkg:npm/next@14.2.30
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1qzn-gxkv-wye3
1
vulnerability VCID-54qu-9bx2-9ka8
2
vulnerability VCID-5kj1-stm6-8qgv
3
vulnerability VCID-fpzm-tpp7-jbft
4
vulnerability VCID-qz2s-22e2-ufg9
5
vulnerability VCID-r4pw-m8mz-xbdq
6
vulnerability VCID-sjdx-v2z6-3fcw
7
vulnerability VCID-w35n-bwuy-5kce
8
vulnerability VCID-xv6q-hbf8-b7b1
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/next@14.2.30
1
url pkg:npm/next@14.3.0-canary.0
purl pkg:npm/next@14.3.0-canary.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5kj1-stm6-8qgv
1
vulnerability VCID-qz2s-22e2-ufg9
2
vulnerability VCID-w35n-bwuy-5kce
3
vulnerability VCID-xv6q-hbf8-b7b1
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/next@14.3.0-canary.0
2
url pkg:npm/next@15.2.2
purl pkg:npm/next@15.2.2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1qzn-gxkv-wye3
1
vulnerability VCID-2tah-y5sg-hugp
2
vulnerability VCID-3m4d-v2y1-5ua4
3
vulnerability VCID-54qu-9bx2-9ka8
4
vulnerability VCID-5kj1-stm6-8qgv
5
vulnerability VCID-jst7-263v-1ydx
6
vulnerability VCID-pqwe-3ukm-dkh4
7
vulnerability VCID-qz2s-22e2-ufg9
8
vulnerability VCID-r4pw-m8mz-xbdq
9
vulnerability VCID-sjdx-v2z6-3fcw
10
vulnerability VCID-w35n-bwuy-5kce
11
vulnerability VCID-xv6q-hbf8-b7b1
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/next@15.2.2
aliases CVE-2025-48068, GHSA-3h52-269p-cp9r
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ub68-nqch-bkdm
14
url VCID-ukfu-ane3-vfch
vulnerability_id VCID-ukfu-ane3-vfch
summary
Next.js authorization bypass vulnerability
### Impact
If a Next.js application is performing authorization in middleware based on pathname, it was possible for this authorization to be bypassed.

### Patches
This issue was patched in Next.js `14.2.15` and later.

If your Next.js application is hosted on Vercel, this vulnerability has been automatically mitigated, regardless of Next.js version.

### Workarounds
There are no official workarounds for this vulnerability.

#### Credits
We'd like to thank [tyage](http://github.com/tyage) (GMO CyberSecurity by IERAE) for responsible disclosure of this issue.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-51479.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-51479.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-51479
reference_id
reference_type
scores
0
value 0.66731
scoring_system epss
scoring_elements 0.98548
published_at 2026-04-18T12:55:00Z
1
value 0.66731
scoring_system epss
scoring_elements 0.98543
published_at 2026-04-13T12:55:00Z
2
value 0.66731
scoring_system epss
scoring_elements 0.98542
published_at 2026-04-12T12:55:00Z
3
value 0.66731
scoring_system epss
scoring_elements 0.98541
published_at 2026-04-09T12:55:00Z
4
value 0.66731
scoring_system epss
scoring_elements 0.98532
published_at 2026-04-02T12:55:00Z
5
value 0.66731
scoring_system epss
scoring_elements 0.98536
published_at 2026-04-07T12:55:00Z
6
value 0.66731
scoring_system epss
scoring_elements 0.98539
published_at 2026-04-08T12:55:00Z
7
value 0.66731
scoring_system epss
scoring_elements 0.98535
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-51479
2
reference_url https://github.com/vercel/next.js
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/vercel/next.js
3
reference_url https://github.com/vercel/next.js/commit/1c8234eb20bc8afd396b89999a00f06b61d72d7b
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/vercel/next.js/commit/1c8234eb20bc8afd396b89999a00f06b61d72d7b
4
reference_url https://github.com/vercel/next.js/releases/tag/v14.2.15
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-17T20:36:20Z/
url https://github.com/vercel/next.js/releases/tag/v14.2.15
5
reference_url https://github.com/vercel/next.js/security/advisories/GHSA-7gfc-8cq8-jh5f
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
2
value HIGH
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-17T20:36:20Z/
url https://github.com/vercel/next.js/security/advisories/GHSA-7gfc-8cq8-jh5f
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2024-51479
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2024-51479
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2332884
reference_id 2332884
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2332884
8
reference_url https://github.com/advisories/GHSA-7gfc-8cq8-jh5f
reference_id GHSA-7gfc-8cq8-jh5f
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-7gfc-8cq8-jh5f
9
reference_url https://access.redhat.com/errata/RHSA-2025:3807
reference_id RHSA-2025:3807
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3807
fixed_packages
0
url pkg:npm/next@14.2.15
purl pkg:npm/next@14.2.15
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1qzn-gxkv-wye3
1
vulnerability VCID-3szn-4nn4-3fek
2
vulnerability VCID-54qu-9bx2-9ka8
3
vulnerability VCID-5kj1-stm6-8qgv
4
vulnerability VCID-fpzm-tpp7-jbft
5
vulnerability VCID-jst7-263v-1ydx
6
vulnerability VCID-qz2s-22e2-ufg9
7
vulnerability VCID-r4pw-m8mz-xbdq
8
vulnerability VCID-sjdx-v2z6-3fcw
9
vulnerability VCID-ub68-nqch-bkdm
10
vulnerability VCID-vwym-qr5h-fue8
11
vulnerability VCID-w35n-bwuy-5kce
12
vulnerability VCID-xv6q-hbf8-b7b1
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/next@14.2.15
aliases CVE-2024-51479, GHSA-7gfc-8cq8-jh5f
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ukfu-ane3-vfch
15
url VCID-vwym-qr5h-fue8
vulnerability_id VCID-vwym-qr5h-fue8
summary
Next.js Race Condition to Cache Poisoning
**Summary**  
We received a responsible disclosure from Allam Rachid (zhero) for a low-severity race-condition vulnerability in Next.js. This issue only affects the **Pages Router** under certain misconfigurations, causing normal endpoints to serve `pageProps` data instead of standard HTML.

[Learn more here](https://vercel.com/changelog/cve-2025-32421)

**Credit**  
Thank you to **Allam Rachid (zhero)** for the responsible disclosure. This research was rewarded as part of our bug bounty program.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-32421.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-32421.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-32421
reference_id
reference_type
scores
0
value 0.0036
scoring_system epss
scoring_elements 0.58212
published_at 2026-04-18T12:55:00Z
1
value 0.0036
scoring_system epss
scoring_elements 0.58209
published_at 2026-04-16T12:55:00Z
2
value 0.0036
scoring_system epss
scoring_elements 0.58177
published_at 2026-04-13T12:55:00Z
3
value 0.0036
scoring_system epss
scoring_elements 0.58197
published_at 2026-04-12T12:55:00Z
4
value 0.0036
scoring_system epss
scoring_elements 0.5822
published_at 2026-04-11T12:55:00Z
5
value 0.0036
scoring_system epss
scoring_elements 0.58204
published_at 2026-04-09T12:55:00Z
6
value 0.0036
scoring_system epss
scoring_elements 0.58171
published_at 2026-04-04T12:55:00Z
7
value 0.0036
scoring_system epss
scoring_elements 0.582
published_at 2026-04-08T12:55:00Z
8
value 0.0036
scoring_system epss
scoring_elements 0.58146
published_at 2026-04-07T12:55:00Z
9
value 0.0036
scoring_system epss
scoring_elements 0.58151
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-32421
2
reference_url https://github.com/vercel/next.js
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
url https://github.com/vercel/next.js
3
reference_url https://github.com/vercel/next.js/security/advisories/GHSA-qpjv-v59x-3qc4
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value LOW
scoring_system cvssv3.1_qr
scoring_elements
2
value LOW
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T15:40:39Z/
url https://github.com/vercel/next.js/security/advisories/GHSA-qpjv-v59x-3qc4
4
reference_url https://nvd.nist.gov/vuln/detail/CVE-2025-32421
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2025-32421
5
reference_url https://vercel.com/changelog/cve-2025-32421
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T15:40:39Z/
url https://vercel.com/changelog/cve-2025-32421
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2366366
reference_id 2366366
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2366366
7
reference_url https://github.com/advisories/GHSA-qpjv-v59x-3qc4
reference_id GHSA-qpjv-v59x-3qc4
reference_type
scores
0
value LOW
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-qpjv-v59x-3qc4
fixed_packages
0
url pkg:npm/next@14.2.24
purl pkg:npm/next@14.2.24
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1qzn-gxkv-wye3
1
vulnerability VCID-54qu-9bx2-9ka8
2
vulnerability VCID-5kj1-stm6-8qgv
3
vulnerability VCID-fpzm-tpp7-jbft
4
vulnerability VCID-jst7-263v-1ydx
5
vulnerability VCID-qz2s-22e2-ufg9
6
vulnerability VCID-r4pw-m8mz-xbdq
7
vulnerability VCID-sjdx-v2z6-3fcw
8
vulnerability VCID-ub68-nqch-bkdm
9
vulnerability VCID-w35n-bwuy-5kce
10
vulnerability VCID-xv6q-hbf8-b7b1
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/next@14.2.24
1
url pkg:npm/next@15.1.6
purl pkg:npm/next@15.1.6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1qzn-gxkv-wye3
1
vulnerability VCID-2tah-y5sg-hugp
2
vulnerability VCID-3m4d-v2y1-5ua4
3
vulnerability VCID-54qu-9bx2-9ka8
4
vulnerability VCID-5kj1-stm6-8qgv
5
vulnerability VCID-dyak-ybr6-fyhy
6
vulnerability VCID-jst7-263v-1ydx
7
vulnerability VCID-pqwe-3ukm-dkh4
8
vulnerability VCID-qz2s-22e2-ufg9
9
vulnerability VCID-r4pw-m8mz-xbdq
10
vulnerability VCID-sjdx-v2z6-3fcw
11
vulnerability VCID-ub68-nqch-bkdm
12
vulnerability VCID-w35n-bwuy-5kce
13
vulnerability VCID-xv6q-hbf8-b7b1
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/next@15.1.6
aliases CVE-2025-32421, GHSA-qpjv-v59x-3qc4
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vwym-qr5h-fue8
16
url VCID-w35n-bwuy-5kce
vulnerability_id VCID-w35n-bwuy-5kce
summary
Next.js HTTP request deserialization can lead to DoS when using insecure React Server Components
A vulnerability affects certain React Server Components packages for versions 19.0.x, 19.1.x, and 19.2.x and frameworks that use the affected packages, including Next.js 13.x, 14.x, 15.x, and 16.x using the App Router. The issue is tracked upstream as [CVE-2026-23864](https://github.com/facebook/react/security/advisories/GHSA-83fc-fqcc-2hmg).

A specially crafted HTTP request can be sent to any App Router Server Function endpoint that, when deserialized, may trigger excessive CPU usage, out-of-memory exceptions, or server crashes. This can result in denial of service in unpatched environments.
references
0
reference_url https://github.com/facebook/react/security/advisories/GHSA-83fc-fqcc-2hmg
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/facebook/react/security/advisories/GHSA-83fc-fqcc-2hmg
1
reference_url https://github.com/vercel/next.js
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/vercel/next.js
2
reference_url https://github.com/vercel/next.js/security/advisories/GHSA-h25m-26qc-wcjf
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/vercel/next.js/security/advisories/GHSA-h25m-26qc-wcjf
3
reference_url https://nvd.nist.gov/vuln/detail/CVE-2026-23864
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2026-23864
4
reference_url https://vercel.com/changelog/summary-of-cve-2026-23864
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://vercel.com/changelog/summary-of-cve-2026-23864
5
reference_url https://github.com/advisories/GHSA-h25m-26qc-wcjf
reference_id GHSA-h25m-26qc-wcjf
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-h25m-26qc-wcjf
fixed_packages
0
url pkg:npm/next@15.0.8
purl pkg:npm/next@15.0.8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3m4d-v2y1-5ua4
1
vulnerability VCID-5kj1-stm6-8qgv
2
vulnerability VCID-qz2s-22e2-ufg9
3
vulnerability VCID-xv6q-hbf8-b7b1
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/next@15.0.8
1
url pkg:npm/next@15.1.12
purl pkg:npm/next@15.1.12
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3m4d-v2y1-5ua4
1
vulnerability VCID-5kj1-stm6-8qgv
2
vulnerability VCID-qz2s-22e2-ufg9
3
vulnerability VCID-xv6q-hbf8-b7b1
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/next@15.1.12
2
url pkg:npm/next@15.2.9
purl pkg:npm/next@15.2.9
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3m4d-v2y1-5ua4
1
vulnerability VCID-5kj1-stm6-8qgv
2
vulnerability VCID-qz2s-22e2-ufg9
3
vulnerability VCID-xv6q-hbf8-b7b1
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/next@15.2.9
3
url pkg:npm/next@15.3.9
purl pkg:npm/next@15.3.9
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3m4d-v2y1-5ua4
1
vulnerability VCID-5kj1-stm6-8qgv
2
vulnerability VCID-qz2s-22e2-ufg9
3
vulnerability VCID-xv6q-hbf8-b7b1
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/next@15.3.9
4
url pkg:npm/next@15.4.11
purl pkg:npm/next@15.4.11
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3m4d-v2y1-5ua4
1
vulnerability VCID-5kj1-stm6-8qgv
2
vulnerability VCID-qz2s-22e2-ufg9
3
vulnerability VCID-xv6q-hbf8-b7b1
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/next@15.4.11
5
url pkg:npm/next@15.5.10
purl pkg:npm/next@15.5.10
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3m4d-v2y1-5ua4
1
vulnerability VCID-5kj1-stm6-8qgv
2
vulnerability VCID-qz2s-22e2-ufg9
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/next@15.5.10
6
url pkg:npm/next@15.6.0-canary.61
purl pkg:npm/next@15.6.0-canary.61
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-xv6q-hbf8-b7b1
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/next@15.6.0-canary.61
7
url pkg:npm/next@16.0.11
purl pkg:npm/next@16.0.11
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3m4d-v2y1-5ua4
1
vulnerability VCID-5kj1-stm6-8qgv
2
vulnerability VCID-6rmp-13nt-2kb9
3
vulnerability VCID-7skv-ksvn-f7bu
4
vulnerability VCID-qz2s-22e2-ufg9
5
vulnerability VCID-wa6u-pkgn-cbaf
6
vulnerability VCID-xv6q-hbf8-b7b1
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/next@16.0.11
8
url pkg:npm/next@16.1.5
purl pkg:npm/next@16.1.5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5kj1-stm6-8qgv
1
vulnerability VCID-6rmp-13nt-2kb9
2
vulnerability VCID-7skv-ksvn-f7bu
3
vulnerability VCID-qz2s-22e2-ufg9
4
vulnerability VCID-wa6u-pkgn-cbaf
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/next@16.1.5
aliases GHSA-h25m-26qc-wcjf
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-w35n-bwuy-5kce
17
url VCID-xu9v-gnn9-bfhf
vulnerability_id VCID-xu9v-gnn9-bfhf
summary
Next.js Server-Side Request Forgery in Server Actions
### Impact
A Server-Side Request Forgery (SSRF) vulnerability was identified in Next.js Server Actions by security researchers at Assetnote. If the `Host` header is modified, and the below conditions are also met, an attacker may be able to make requests that appear to be originating from the Next.js application server itself.

#### Prerequisites
* Next.js (`<14.1.1`) is running in a self-hosted* manner.
* The Next.js application makes use of Server Actions.
* The Server Action performs a redirect to a relative path which starts with a `/`.

\* Many hosting providers (including Vercel) route requests based on the Host header, so we do not believe that this vulnerability affects any Next.js applications where routing is done in this manner.

### Patches
This vulnerability was patched in [#62561](https://github.com/vercel/next.js/pull/62561) and fixed in Next.js `14.1.1`.
 
### Workarounds
There are no official workarounds for this vulnerability. We recommend upgrading to Next.js `14.1.1`.

### Credit
Vercel and the Next.js team thank Assetnote for responsibly disclosing this issue to us, and for working with us to verify the fix. Thanks to:

Adam Kues - Assetnote
Shubham Shah - Assetnote
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-34351.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-34351.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-34351
reference_id
reference_type
scores
0
value 0.92751
scoring_system epss
scoring_elements 0.99757
published_at 2026-04-18T12:55:00Z
1
value 0.92751
scoring_system epss
scoring_elements 0.99756
published_at 2026-04-16T12:55:00Z
2
value 0.92751
scoring_system epss
scoring_elements 0.99755
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-34351
2
reference_url https://github.com/vercel/next.js
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/vercel/next.js
3
reference_url https://github.com/vercel/next.js/commit/8f7a6ca7d21a97bc9f7a1bbe10427b5ad74b9085
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-05-10T18:01:14Z/
url https://github.com/vercel/next.js/commit/8f7a6ca7d21a97bc9f7a1bbe10427b5ad74b9085
4
reference_url https://github.com/vercel/next.js/pull/62561
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-05-10T18:01:14Z/
url https://github.com/vercel/next.js/pull/62561
5
reference_url https://github.com/vercel/next.js/security/advisories/GHSA-fr5h-rqp8-mj6g
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
2
value HIGH
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-05-10T18:01:14Z/
url https://github.com/vercel/next.js/security/advisories/GHSA-fr5h-rqp8-mj6g
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2024-34351
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2024-34351
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2454387
reference_id 2454387
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2454387
8
reference_url https://github.com/advisories/GHSA-fr5h-rqp8-mj6g
reference_id GHSA-fr5h-rqp8-mj6g
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-fr5h-rqp8-mj6g
fixed_packages
0
url pkg:npm/next@14.1.1
purl pkg:npm/next@14.1.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1qzn-gxkv-wye3
1
vulnerability VCID-3szn-4nn4-3fek
2
vulnerability VCID-54qu-9bx2-9ka8
3
vulnerability VCID-5kj1-stm6-8qgv
4
vulnerability VCID-fpzm-tpp7-jbft
5
vulnerability VCID-fwnm-krm1-6kh6
6
vulnerability VCID-jst7-263v-1ydx
7
vulnerability VCID-qz2s-22e2-ufg9
8
vulnerability VCID-r4pw-m8mz-xbdq
9
vulnerability VCID-sjdx-v2z6-3fcw
10
vulnerability VCID-ub68-nqch-bkdm
11
vulnerability VCID-ukfu-ane3-vfch
12
vulnerability VCID-v81y-zgg2-8ycf
13
vulnerability VCID-vwym-qr5h-fue8
14
vulnerability VCID-w35n-bwuy-5kce
15
vulnerability VCID-xv6q-hbf8-b7b1
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/next@14.1.1
aliases CVE-2024-34351, GHSA-fr5h-rqp8-mj6g
risk_score 10.0
exploitability 2.0
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xu9v-gnn9-bfhf
18
url VCID-xv6q-hbf8-b7b1
vulnerability_id VCID-xv6q-hbf8-b7b1
summary
Next.js self-hosted applications vulnerable to DoS via Image Optimizer remotePatterns configuration
A DoS vulnerability exists in self-hosted Next.js applications that have `remotePatterns` configured for the Image Optimizer. The image optimization endpoint (`/_next/image`) loads external images entirely into memory without enforcing a maximum size limit, allowing an attacker to cause out-of-memory conditions by requesting optimization of arbitrarily large images. This vulnerability requires that `remotePatterns` is configured to allow image optimization from external domains and that the attacker can serve or control a large image on an allowed domain.

Strongly consider upgrading to 15.5.10 and 16.1.5 to reduce risk and prevent availability issues in Next applications.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-59471.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-59471.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-59471
reference_id
reference_type
scores
0
value 0.00026
scoring_system epss
scoring_elements 0.07214
published_at 2026-04-02T12:55:00Z
1
value 0.00027
scoring_system epss
scoring_elements 0.07621
published_at 2026-04-18T12:55:00Z
2
value 0.00027
scoring_system epss
scoring_elements 0.07692
published_at 2026-04-04T12:55:00Z
3
value 0.00027
scoring_system epss
scoring_elements 0.07661
published_at 2026-04-07T12:55:00Z
4
value 0.00027
scoring_system epss
scoring_elements 0.07721
published_at 2026-04-08T12:55:00Z
5
value 0.00027
scoring_system epss
scoring_elements 0.07739
published_at 2026-04-09T12:55:00Z
6
value 0.00027
scoring_system epss
scoring_elements 0.07738
published_at 2026-04-11T12:55:00Z
7
value 0.00027
scoring_system epss
scoring_elements 0.07724
published_at 2026-04-12T12:55:00Z
8
value 0.00027
scoring_system epss
scoring_elements 0.07708
published_at 2026-04-13T12:55:00Z
9
value 0.00027
scoring_system epss
scoring_elements 0.07633
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-59471
2
reference_url https://github.com/vercel/next.js
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/vercel/next.js
3
reference_url https://github.com/vercel/next.js/commit/500ec83743639addceaede95e95913398975156c
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/vercel/next.js/commit/500ec83743639addceaede95e95913398975156c
4
reference_url https://github.com/vercel/next.js/commit/e5b834d208fe0edf64aa26b5d76dcf6a176500ec
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/vercel/next.js/commit/e5b834d208fe0edf64aa26b5d76dcf6a176500ec
5
reference_url https://github.com/vercel/next.js/releases/tag/v15.5.10
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/vercel/next.js/releases/tag/v15.5.10
6
reference_url https://github.com/vercel/next.js/releases/tag/v16.1.5
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/vercel/next.js/releases/tag/v16.1.5
7
reference_url https://github.com/vercel/next.js/security/advisories/GHSA-9g9p-9gw9-jx7f
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-27T14:54:47Z/
url https://github.com/vercel/next.js/security/advisories/GHSA-9g9p-9gw9-jx7f
8
reference_url https://nvd.nist.gov/vuln/detail/CVE-2025-59471
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2025-59471
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2433094
reference_id 2433094
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2433094
10
reference_url https://github.com/advisories/GHSA-9g9p-9gw9-jx7f
reference_id GHSA-9g9p-9gw9-jx7f
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-9g9p-9gw9-jx7f
fixed_packages
0
url pkg:npm/next@15.5.10
purl pkg:npm/next@15.5.10
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3m4d-v2y1-5ua4
1
vulnerability VCID-5kj1-stm6-8qgv
2
vulnerability VCID-qz2s-22e2-ufg9
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/next@15.5.10
1
url pkg:npm/next@16.1.5
purl pkg:npm/next@16.1.5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5kj1-stm6-8qgv
1
vulnerability VCID-6rmp-13nt-2kb9
2
vulnerability VCID-7skv-ksvn-f7bu
3
vulnerability VCID-qz2s-22e2-ufg9
4
vulnerability VCID-wa6u-pkgn-cbaf
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/next@16.1.5
aliases CVE-2025-59471, GHSA-9g9p-9gw9-jx7f
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xv6q-hbf8-b7b1
Fixing_vulnerabilities
Risk_score10.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:npm/next@13.4.5-canary.12