Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/66926?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/66926?format=api", "purl": "pkg:npm/next@15.1.10", "type": "npm", "namespace": "", "name": "next", "version": "15.1.10", "qualifiers": {}, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": "15.5.14", "latest_non_vulnerable_version": "16.2.3", "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/20448?format=api", "vulnerability_id": "VCID-3m4d-v2y1-5ua4", "summary": "Next.js has Unbounded Memory Consumption via PPR Resume Endpoint\nA denial of service vulnerability exists in Next.js versions with Partial Prerendering (PPR) enabled when running in minimal mode. The PPR resume endpoint accepts unauthenticated POST requests with the `Next-Resume: 1` header and processes attacker-controlled postponed state data. Two closely related vulnerabilities allow an attacker to crash the server process through memory exhaustion:\n\n1. **Unbounded request body buffering**: The server buffers the entire POST request body into memory using `Buffer.concat()` without enforcing any size limit, allowing arbitrarily large payloads to exhaust available memory.\n\n2. **Unbounded decompression (zipbomb)**: The resume data cache is decompressed using `inflateSync()` without limiting the decompressed output size. A small compressed payload can expand to hundreds of megabytes or gigabytes, causing memory exhaustion.\n\nBoth attack vectors result in a fatal V8 out-of-memory error (`FATAL ERROR: Reached heap limit Allocation failed - JavaScript heap out of memory`) causing the Node.js process to terminate. The zipbomb variant is particularly dangerous as it can bypass reverse proxy request size limits while still causing large memory allocation on the server.\n\nTo be affected, an application must run with `experimental.ppr: true` or `cacheComponents: true` configured along with the NEXT_PRIVATE_MINIMAL_MODE=1 environment variable.\n\nStrongly consider upgrading to 15.6.0-canary.61 or 16.1.5 to reduce risk and prevent availability issues in Next applications.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-59472.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-59472.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-59472", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.2486", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00089", "scoring_system": "epss", "scoring_elements": "0.25313", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00089", "scoring_system": "epss", "scoring_elements": "0.25543", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00089", "scoring_system": "epss", "scoring_elements": "0.25315", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00089", "scoring_system": "epss", "scoring_elements": "0.25383", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00089", "scoring_system": "epss", "scoring_elements": "0.25428", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00089", "scoring_system": "epss", "scoring_elements": "0.25439", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00089", "scoring_system": "epss", "scoring_elements": "0.25398", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00089", "scoring_system": "epss", "scoring_elements": "0.25344", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00089", "scoring_system": "epss", "scoring_elements": "0.25352", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00089", "scoring_system": "epss", "scoring_elements": "0.25343", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-59472" }, { "reference_url": "https://github.com/vercel/next.js", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/vercel/next.js" }, { "reference_url": "https://github.com/vercel/next.js/security/advisories/GHSA-5f7q-jpqc-wp7h", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "MODERATE", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-27T14:52:42Z/" } ], "url": "https://github.com/vercel/next.js/security/advisories/GHSA-5f7q-jpqc-wp7h" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2025-59472", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-59472" }, { "reference_url": "https://vercel.com/changelog/summaries-of-cve-2025-59471-and-cve-2025-59472", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://vercel.com/changelog/summaries-of-cve-2025-59471-and-cve-2025-59472" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2433092", "reference_id": "2433092", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2433092" }, { "reference_url": "https://github.com/advisories/GHSA-5f7q-jpqc-wp7h", "reference_id": "GHSA-5f7q-jpqc-wp7h", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" } ], "url": "https://github.com/advisories/GHSA-5f7q-jpqc-wp7h" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/578632?format=api", "purl": "pkg:npm/next@15.2.0", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1qzn-gxkv-wye3" }, { "vulnerability": "VCID-2tah-y5sg-hugp" }, { "vulnerability": "VCID-3m4d-v2y1-5ua4" }, { "vulnerability": "VCID-54qu-9bx2-9ka8" }, { "vulnerability": "VCID-5kj1-stm6-8qgv" }, { "vulnerability": "VCID-jst7-263v-1ydx" }, { "vulnerability": "VCID-pqwe-3ukm-dkh4" }, { "vulnerability": "VCID-qz2s-22e2-ufg9" }, { "vulnerability": "VCID-r4pw-m8mz-xbdq" }, { "vulnerability": "VCID-sjdx-v2z6-3fcw" }, { "vulnerability": "VCID-ub68-nqch-bkdm" }, { "vulnerability": "VCID-w35n-bwuy-5kce" }, { "vulnerability": "VCID-xv6q-hbf8-b7b1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:npm/next@15.2.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/578639?format=api", "purl": "pkg:npm/next@15.2.1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1qzn-gxkv-wye3" }, { "vulnerability": "VCID-2tah-y5sg-hugp" }, { "vulnerability": "VCID-3m4d-v2y1-5ua4" }, { "vulnerability": "VCID-54qu-9bx2-9ka8" }, { "vulnerability": "VCID-5kj1-stm6-8qgv" }, { "vulnerability": "VCID-jst7-263v-1ydx" }, { "vulnerability": "VCID-pqwe-3ukm-dkh4" }, { "vulnerability": "VCID-qz2s-22e2-ufg9" }, { "vulnerability": "VCID-r4pw-m8mz-xbdq" }, { "vulnerability": "VCID-sjdx-v2z6-3fcw" }, { "vulnerability": "VCID-ub68-nqch-bkdm" }, { "vulnerability": "VCID-w35n-bwuy-5kce" }, { "vulnerability": "VCID-xv6q-hbf8-b7b1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:npm/next@15.2.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/71112?format=api", "purl": "pkg:npm/next@15.2.2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1qzn-gxkv-wye3" }, { "vulnerability": "VCID-2tah-y5sg-hugp" }, { "vulnerability": "VCID-3m4d-v2y1-5ua4" }, { "vulnerability": "VCID-54qu-9bx2-9ka8" }, { "vulnerability": "VCID-5kj1-stm6-8qgv" }, { "vulnerability": "VCID-jst7-263v-1ydx" }, { "vulnerability": "VCID-pqwe-3ukm-dkh4" }, { "vulnerability": "VCID-qz2s-22e2-ufg9" }, { "vulnerability": "VCID-r4pw-m8mz-xbdq" }, { "vulnerability": "VCID-sjdx-v2z6-3fcw" }, { "vulnerability": "VCID-w35n-bwuy-5kce" }, { "vulnerability": "VCID-xv6q-hbf8-b7b1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:npm/next@15.2.2" }, { "url": "http://public2.vulnerablecode.io/api/packages/570594?format=api", "purl": "pkg:npm/next@15.3.0", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1qzn-gxkv-wye3" }, { "vulnerability": "VCID-2tah-y5sg-hugp" }, { "vulnerability": "VCID-3m4d-v2y1-5ua4" }, { "vulnerability": "VCID-54a7-9e98-3bc4" }, { "vulnerability": "VCID-54qu-9bx2-9ka8" }, { "vulnerability": "VCID-5kj1-stm6-8qgv" }, { "vulnerability": "VCID-pqwe-3ukm-dkh4" }, { "vulnerability": "VCID-qz2s-22e2-ufg9" }, { "vulnerability": "VCID-r4pw-m8mz-xbdq" }, { "vulnerability": "VCID-sjdx-v2z6-3fcw" }, { "vulnerability": "VCID-w35n-bwuy-5kce" }, { "vulnerability": "VCID-xv6q-hbf8-b7b1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:npm/next@15.3.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/777498?format=api", "purl": "pkg:npm/next@15.3.1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1qzn-gxkv-wye3" }, { "vulnerability": "VCID-2tah-y5sg-hugp" }, { "vulnerability": "VCID-3m4d-v2y1-5ua4" }, { "vulnerability": "VCID-54a7-9e98-3bc4" }, { "vulnerability": "VCID-54qu-9bx2-9ka8" }, { "vulnerability": "VCID-5kj1-stm6-8qgv" }, { "vulnerability": "VCID-pqwe-3ukm-dkh4" }, { "vulnerability": "VCID-qz2s-22e2-ufg9" }, { "vulnerability": "VCID-r4pw-m8mz-xbdq" }, { "vulnerability": "VCID-sjdx-v2z6-3fcw" }, { "vulnerability": "VCID-w35n-bwuy-5kce" }, { "vulnerability": "VCID-xv6q-hbf8-b7b1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:npm/next@15.3.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/802066?format=api", "purl": "pkg:npm/next@15.4.0", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1qzn-gxkv-wye3" }, { "vulnerability": "VCID-2tah-y5sg-hugp" }, { "vulnerability": "VCID-3m4d-v2y1-5ua4" }, { "vulnerability": "VCID-54qu-9bx2-9ka8" }, { "vulnerability": "VCID-5kj1-stm6-8qgv" }, { "vulnerability": "VCID-pqwe-3ukm-dkh4" }, { "vulnerability": "VCID-qz2s-22e2-ufg9" }, { "vulnerability": "VCID-r4pw-m8mz-xbdq" }, { "vulnerability": "VCID-sjdx-v2z6-3fcw" }, { "vulnerability": "VCID-w35n-bwuy-5kce" }, { "vulnerability": "VCID-xv6q-hbf8-b7b1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:npm/next@15.4.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/802124?format=api", "purl": "pkg:npm/next@15.4.2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1qzn-gxkv-wye3" }, { "vulnerability": "VCID-2tah-y5sg-hugp" }, { "vulnerability": "VCID-3m4d-v2y1-5ua4" }, { "vulnerability": "VCID-54qu-9bx2-9ka8" }, { "vulnerability": "VCID-5kj1-stm6-8qgv" }, { "vulnerability": "VCID-pqwe-3ukm-dkh4" }, { "vulnerability": "VCID-qz2s-22e2-ufg9" }, { "vulnerability": "VCID-r4pw-m8mz-xbdq" }, { "vulnerability": "VCID-sjdx-v2z6-3fcw" }, { "vulnerability": "VCID-w35n-bwuy-5kce" }, { "vulnerability": "VCID-xv6q-hbf8-b7b1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:npm/next@15.4.2" }, { "url": "http://public2.vulnerablecode.io/api/packages/855139?format=api", "purl": "pkg:npm/next@15.5.1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1qzn-gxkv-wye3" }, { "vulnerability": "VCID-2tah-y5sg-hugp" }, { "vulnerability": "VCID-3m4d-v2y1-5ua4" }, { "vulnerability": "VCID-5kj1-stm6-8qgv" }, { "vulnerability": "VCID-pqwe-3ukm-dkh4" }, { "vulnerability": "VCID-qz2s-22e2-ufg9" }, { "vulnerability": "VCID-w35n-bwuy-5kce" }, { "vulnerability": "VCID-xv6q-hbf8-b7b1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:npm/next@15.5.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/61644?format=api", "purl": "pkg:npm/next@15.6.0-canary.61", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-xv6q-hbf8-b7b1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:npm/next@15.6.0-canary.61" }, { "url": "http://public2.vulnerablecode.io/api/packages/61646?format=api", "purl": "pkg:npm/next@16.1.5", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5kj1-stm6-8qgv" }, { "vulnerability": "VCID-6rmp-13nt-2kb9" }, { "vulnerability": "VCID-7skv-ksvn-f7bu" }, { "vulnerability": "VCID-qz2s-22e2-ufg9" }, { "vulnerability": "VCID-wa6u-pkgn-cbaf" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:npm/next@16.1.5" } ], "aliases": [ "CVE-2025-59472", "GHSA-5f7q-jpqc-wp7h" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3m4d-v2y1-5ua4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/24378?format=api", "vulnerability_id": "VCID-5kj1-stm6-8qgv", "summary": "Next.js: HTTP request smuggling in rewrites\n## Summary\nWhen Next.js rewrites proxy traffic to an external backend, a crafted `DELETE`/`OPTIONS` request using `Transfer-Encoding: chunked` could trigger request boundary disagreement between the proxy and backend. This could allow request smuggling through rewritten routes.\n\n## Impact\nAn attacker could smuggle a second request to unintended backend routes (for example, internal/admin endpoints), bypassing assumptions that only the configured rewrite destination/path is reachable. This does not impact applications hosted on providers that handle rewrites at the CDN level, such as Vercel. \n\n## Patches\nThe vulnerability originated in an upstream library vendored by Next.js. It is fixed by updating that dependency’s behavior so `content-length: 0` is added only when both `content-length` and `transfer-encoding` are absent, and `transfer-encoding` is no longer removed in that code path.\n\n## Workarounds\nIf upgrade is not immediately possible:\n- Block chunked `DELETE`/`OPTIONS` requests on rewritten routes at your edge/proxy.\n- Enforce authentication/authorization on backend routes per our [security guidance](https://nextjs.org/docs/app/guides/data-security).", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-29057.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-29057.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-29057", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00029", "scoring_system": "epss", "scoring_elements": "0.08379", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00063", "scoring_system": "epss", "scoring_elements": "0.19764", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00063", "scoring_system": "epss", "scoring_elements": "0.19759", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00063", "scoring_system": "epss", "scoring_elements": "0.19708", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00063", "scoring_system": "epss", "scoring_elements": "0.19628", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.22369", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.22413", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00083", "scoring_system": "epss", "scoring_elements": "0.24321", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00083", "scoring_system": "epss", "scoring_elements": "0.24331", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00083", "scoring_system": "epss", "scoring_elements": "0.2437", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00083", "scoring_system": "epss", "scoring_elements": "0.24313", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-29057" }, { "reference_url": "https://github.com/vercel/next.js", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/vercel/next.js" }, { "reference_url": "https://github.com/vercel/next.js/commit/dc98c04f376c6a1df76ec3e0a2d07edf4abdabd6", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-18T14:47:14Z/" } ], "url": "https://github.com/vercel/next.js/commit/dc98c04f376c6a1df76ec3e0a2d07edf4abdabd6" }, { "reference_url": "https://github.com/vercel/next.js/releases/tag/v15.5.13", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-18T14:47:14Z/" } ], "url": "https://github.com/vercel/next.js/releases/tag/v15.5.13" }, { "reference_url": "https://github.com/vercel/next.js/releases/tag/v16.1.7", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-18T14:47:14Z/" } ], "url": "https://github.com/vercel/next.js/releases/tag/v16.1.7" }, { "reference_url": "https://github.com/vercel/next.js/security/advisories/GHSA-ggv3-7p47-pfv8", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" }, { "value": "6.3", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-18T14:47:14Z/" } ], "url": "https://github.com/vercel/next.js/security/advisories/GHSA-ggv3-7p47-pfv8" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2026-29057", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-29057" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2448515", "reference_id": "2448515", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2448515" }, { "reference_url": "https://github.com/advisories/GHSA-ggv3-7p47-pfv8", "reference_id": "GHSA-ggv3-7p47-pfv8", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" } ], "url": "https://github.com/advisories/GHSA-ggv3-7p47-pfv8" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/67554?format=api", "purl": "pkg:npm/next@15.5.13", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qz2s-22e2-ufg9" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:npm/next@15.5.13" }, { "url": "http://public2.vulnerablecode.io/api/packages/67076?format=api", "purl": "pkg:npm/next@16.1.7", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:npm/next@16.1.7" } ], "aliases": [ "CVE-2026-29057", "GHSA-ggv3-7p47-pfv8" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5kj1-stm6-8qgv" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/23916?format=api", "vulnerability_id": "VCID-fpzm-tpp7-jbft", "summary": "Next has a Denial of Service with Server Components - Incomplete Fix Follow-Up\nIt was discovered that the fix for [CVE-2025-55184](https://github.com/advisories/GHSA-2m3v-v2m8-q956) in React Server Components was incomplete and did not fully mitigate denial-of-service conditions across all payload types. As a result, certain crafted inputs could still trigger excessive resource consumption.\n\nThis vulnerability affects React versions 19.0.2, 19.1.3, and 19.2.2, as well as frameworks that bundle or depend on these versions, including Next.js 13.x, 14.x, 15.x, and 16.x when using the App Router. The issue is tracked upstream as [CVE-2025-67779](https://www.cve.org/CVERecord?id=CVE-2025-67779).\n\nA malicious actor can send a specially crafted HTTP request to a Server Function endpoint that, when deserialized, causes the React Server Components runtime to enter an infinite loop. This can lead to sustained CPU consumption and cause the affected server process to become unresponsive, resulting in a denial-of-service condition in unpatched environments.", "references": [ { "reference_url": "https://github.com/vercel/next.js", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/vercel/next.js" }, { "reference_url": "https://nextjs.org/blog/security-update-2025-12-11", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://nextjs.org/blog/security-update-2025-12-11" }, { "reference_url": "https://react.dev/blog/2025/12/11/denial-of-service-and-source-code-exposure-in-react-server-components", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://react.dev/blog/2025/12/11/denial-of-service-and-source-code-exposure-in-react-server-components" }, { "reference_url": "https://www.cve.org/CVERecord?id=CVE-2025-55184", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.cve.org/CVERecord?id=CVE-2025-55184" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2025-67779", "reference_id": "CVE-2025-67779", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-67779" }, { "reference_url": "https://www.facebook.com/security/advisories/cve-2025-67779", "reference_id": "CVE-2025-67779", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.facebook.com/security/advisories/cve-2025-67779" }, { "reference_url": "https://github.com/advisories/GHSA-5j59-xgg2-r9c4", "reference_id": "GHSA-5j59-xgg2-r9c4", "reference_type": "", "scores": [ { "value": "HIGH", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" } ], "url": "https://github.com/advisories/GHSA-5j59-xgg2-r9c4" }, { "reference_url": "https://github.com/vercel/next.js/security/advisories/GHSA-5j59-xgg2-r9c4", "reference_id": "GHSA-5j59-xgg2-r9c4", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/vercel/next.js/security/advisories/GHSA-5j59-xgg2-r9c4" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/66970?format=api", "purl": "pkg:npm/next@15.1.11", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3m4d-v2y1-5ua4" }, { "vulnerability": "VCID-5kj1-stm6-8qgv" }, { "vulnerability": "VCID-qz2s-22e2-ufg9" }, { "vulnerability": "VCID-w35n-bwuy-5kce" }, { "vulnerability": "VCID-xv6q-hbf8-b7b1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:npm/next@15.1.11" }, { "url": "http://public2.vulnerablecode.io/api/packages/66971?format=api", "purl": "pkg:npm/next@15.2.8", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3m4d-v2y1-5ua4" }, { "vulnerability": "VCID-5kj1-stm6-8qgv" }, { "vulnerability": "VCID-qz2s-22e2-ufg9" }, { "vulnerability": "VCID-w35n-bwuy-5kce" }, { "vulnerability": "VCID-xv6q-hbf8-b7b1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:npm/next@15.2.8" }, { "url": "http://public2.vulnerablecode.io/api/packages/66972?format=api", "purl": "pkg:npm/next@15.3.8", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3m4d-v2y1-5ua4" }, { "vulnerability": "VCID-5kj1-stm6-8qgv" }, { "vulnerability": "VCID-qz2s-22e2-ufg9" }, { "vulnerability": "VCID-w35n-bwuy-5kce" }, { "vulnerability": "VCID-xv6q-hbf8-b7b1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:npm/next@15.3.8" }, { "url": "http://public2.vulnerablecode.io/api/packages/66973?format=api", "purl": "pkg:npm/next@15.4.10", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3m4d-v2y1-5ua4" }, { "vulnerability": "VCID-5kj1-stm6-8qgv" }, { "vulnerability": "VCID-qz2s-22e2-ufg9" }, { "vulnerability": "VCID-w35n-bwuy-5kce" }, { "vulnerability": "VCID-xv6q-hbf8-b7b1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:npm/next@15.4.10" }, { "url": "http://public2.vulnerablecode.io/api/packages/66974?format=api", "purl": "pkg:npm/next@15.5.9", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3m4d-v2y1-5ua4" }, { "vulnerability": "VCID-5kj1-stm6-8qgv" }, { "vulnerability": "VCID-qz2s-22e2-ufg9" }, { "vulnerability": "VCID-w35n-bwuy-5kce" }, { "vulnerability": "VCID-xv6q-hbf8-b7b1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:npm/next@15.5.9" }, { "url": "http://public2.vulnerablecode.io/api/packages/66975?format=api", "purl": "pkg:npm/next@15.6.0-canary.60", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3m4d-v2y1-5ua4" }, { "vulnerability": "VCID-w35n-bwuy-5kce" }, { "vulnerability": "VCID-xv6q-hbf8-b7b1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:npm/next@15.6.0-canary.60" }, { "url": "http://public2.vulnerablecode.io/api/packages/66976?format=api", "purl": "pkg:npm/next@16.0.10", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3m4d-v2y1-5ua4" }, { "vulnerability": "VCID-5kj1-stm6-8qgv" }, { "vulnerability": "VCID-6rmp-13nt-2kb9" }, { "vulnerability": "VCID-7skv-ksvn-f7bu" }, { "vulnerability": "VCID-qz2s-22e2-ufg9" }, { "vulnerability": "VCID-w35n-bwuy-5kce" }, { "vulnerability": "VCID-wa6u-pkgn-cbaf" }, { "vulnerability": "VCID-xv6q-hbf8-b7b1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:npm/next@16.0.10" }, { "url": "http://public2.vulnerablecode.io/api/packages/66977?format=api", "purl": "pkg:npm/next@16.1.0-canary.19", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3m4d-v2y1-5ua4" }, { "vulnerability": "VCID-5kj1-stm6-8qgv" }, { "vulnerability": "VCID-6rmp-13nt-2kb9" }, { "vulnerability": "VCID-7skv-ksvn-f7bu" }, { "vulnerability": "VCID-qz2s-22e2-ufg9" }, { "vulnerability": "VCID-w35n-bwuy-5kce" }, { "vulnerability": "VCID-wa6u-pkgn-cbaf" }, { "vulnerability": "VCID-xv6q-hbf8-b7b1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:npm/next@16.1.0-canary.19" } ], "aliases": [ "GHSA-5j59-xgg2-r9c4" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-fpzm-tpp7-jbft" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/24472?format=api", "vulnerability_id": "VCID-qz2s-22e2-ufg9", "summary": "Next.js: Unbounded next/image disk cache growth can exhaust storage\n## Summary\nThe default Next.js image optimization disk cache (`/_next/image`) did not have a configurable upper bound, allowing unbounded cache growth.\n\n## Impact\nAn attacker could generate many unique image-optimization variants and exhaust disk space, causing denial of service. Note that this does not impact platforms that have their own image optimization capabilities, such as Vercel.\n\n## Patches\nFixed by adding an LRU-backed disk cache with `images.maximumDiskCacheSize`, including eviction of least-recently-used entries when the limit is exceeded. Setting `maximumDiskCacheSize: 0` disables disk caching. \n\n## Workarounds\nIf upgrade is not immediately possible:\n- Periodically clean `.next/cache/images`.\n- Reduce variant cardinality (e.g., tighten values for `images.localPatterns`, `images.remotePatterns`, and `images.qualities`)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-27980.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-27980.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-27980", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.0444", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.04466", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05534", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05541", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05554", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05581", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05558", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.0552", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05495", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05484", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00022", "scoring_system": "epss", "scoring_elements": "0.06161", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-27980" }, { "reference_url": "https://github.com/vercel/next.js", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.9", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/vercel/next.js" }, { "reference_url": "https://github.com/vercel/next.js/commit/39eb8e0ac498b48855a0430fbf4c22276a73b4bd", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.9", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-18T19:50:06Z/" } ], "url": "https://github.com/vercel/next.js/commit/39eb8e0ac498b48855a0430fbf4c22276a73b4bd" }, { "reference_url": "https://github.com/vercel/next.js/releases/tag/v16.1.7", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.9", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-18T19:50:06Z/" } ], "url": "https://github.com/vercel/next.js/releases/tag/v16.1.7" }, { "reference_url": "https://github.com/vercel/next.js/security/advisories/GHSA-3x4c-7xq6-9pq8", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" }, { "value": "6.9", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-18T19:50:06Z/" } ], "url": "https://github.com/vercel/next.js/security/advisories/GHSA-3x4c-7xq6-9pq8" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27980", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.9", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27980" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2448509", "reference_id": "2448509", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2448509" }, { "reference_url": "https://github.com/advisories/GHSA-3x4c-7xq6-9pq8", "reference_id": "GHSA-3x4c-7xq6-9pq8", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" } ], "url": "https://github.com/advisories/GHSA-3x4c-7xq6-9pq8" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/67667?format=api", "purl": "pkg:npm/next@15.5.14", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:npm/next@15.5.14" }, { "url": "http://public2.vulnerablecode.io/api/packages/66919?format=api", "purl": "pkg:npm/next@15.6.0-canary.0", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1qzn-gxkv-wye3" }, { "vulnerability": "VCID-2tah-y5sg-hugp" }, { "vulnerability": "VCID-3m4d-v2y1-5ua4" }, { "vulnerability": "VCID-w35n-bwuy-5kce" }, { "vulnerability": "VCID-xv6q-hbf8-b7b1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:npm/next@15.6.0-canary.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/67076?format=api", "purl": "pkg:npm/next@16.1.7", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:npm/next@16.1.7" } ], "aliases": [ "CVE-2026-27980", "GHSA-3x4c-7xq6-9pq8" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qz2s-22e2-ufg9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/20177?format=api", "vulnerability_id": "VCID-w35n-bwuy-5kce", "summary": "Next.js HTTP request deserialization can lead to DoS when using insecure React Server Components\nA vulnerability affects certain React Server Components packages for versions 19.0.x, 19.1.x, and 19.2.x and frameworks that use the affected packages, including Next.js 13.x, 14.x, 15.x, and 16.x using the App Router. The issue is tracked upstream as [CVE-2026-23864](https://github.com/facebook/react/security/advisories/GHSA-83fc-fqcc-2hmg).\n\nA specially crafted HTTP request can be sent to any App Router Server Function endpoint that, when deserialized, may trigger excessive CPU usage, out-of-memory exceptions, or server crashes. This can result in denial of service in unpatched environments.", "references": [ { "reference_url": "https://github.com/facebook/react/security/advisories/GHSA-83fc-fqcc-2hmg", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/facebook/react/security/advisories/GHSA-83fc-fqcc-2hmg" }, { "reference_url": "https://github.com/vercel/next.js", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/vercel/next.js" }, { "reference_url": "https://github.com/vercel/next.js/security/advisories/GHSA-h25m-26qc-wcjf", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/vercel/next.js/security/advisories/GHSA-h25m-26qc-wcjf" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2026-23864", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-23864" }, { "reference_url": "https://vercel.com/changelog/summary-of-cve-2026-23864", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://vercel.com/changelog/summary-of-cve-2026-23864" }, { "reference_url": "https://github.com/advisories/GHSA-h25m-26qc-wcjf", "reference_id": "GHSA-h25m-26qc-wcjf", "reference_type": "", "scores": [ { "value": "HIGH", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" } ], "url": "https://github.com/advisories/GHSA-h25m-26qc-wcjf" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/61637?format=api", "purl": "pkg:npm/next@15.1.12", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3m4d-v2y1-5ua4" }, { "vulnerability": "VCID-5kj1-stm6-8qgv" }, { "vulnerability": "VCID-qz2s-22e2-ufg9" }, { "vulnerability": "VCID-xv6q-hbf8-b7b1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:npm/next@15.1.12" }, { "url": "http://public2.vulnerablecode.io/api/packages/61639?format=api", "purl": "pkg:npm/next@15.2.9", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3m4d-v2y1-5ua4" }, { "vulnerability": "VCID-5kj1-stm6-8qgv" }, { "vulnerability": "VCID-qz2s-22e2-ufg9" }, { "vulnerability": "VCID-xv6q-hbf8-b7b1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:npm/next@15.2.9" }, { "url": "http://public2.vulnerablecode.io/api/packages/61641?format=api", "purl": "pkg:npm/next@15.3.9", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3m4d-v2y1-5ua4" }, { "vulnerability": "VCID-5kj1-stm6-8qgv" }, { "vulnerability": "VCID-qz2s-22e2-ufg9" }, { "vulnerability": "VCID-xv6q-hbf8-b7b1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:npm/next@15.3.9" }, { "url": "http://public2.vulnerablecode.io/api/packages/61642?format=api", "purl": "pkg:npm/next@15.4.11", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3m4d-v2y1-5ua4" }, { "vulnerability": "VCID-5kj1-stm6-8qgv" }, { "vulnerability": "VCID-qz2s-22e2-ufg9" }, { "vulnerability": "VCID-xv6q-hbf8-b7b1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:npm/next@15.4.11" }, { "url": "http://public2.vulnerablecode.io/api/packages/61643?format=api", "purl": "pkg:npm/next@15.5.10", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3m4d-v2y1-5ua4" }, { "vulnerability": "VCID-5kj1-stm6-8qgv" }, { "vulnerability": "VCID-qz2s-22e2-ufg9" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:npm/next@15.5.10" }, { "url": "http://public2.vulnerablecode.io/api/packages/61644?format=api", "purl": "pkg:npm/next@15.6.0-canary.61", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-xv6q-hbf8-b7b1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:npm/next@15.6.0-canary.61" }, { "url": "http://public2.vulnerablecode.io/api/packages/61645?format=api", "purl": "pkg:npm/next@16.0.11", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3m4d-v2y1-5ua4" }, { "vulnerability": "VCID-5kj1-stm6-8qgv" }, { "vulnerability": "VCID-6rmp-13nt-2kb9" }, { "vulnerability": "VCID-7skv-ksvn-f7bu" }, { "vulnerability": "VCID-qz2s-22e2-ufg9" }, { "vulnerability": "VCID-wa6u-pkgn-cbaf" }, { "vulnerability": "VCID-xv6q-hbf8-b7b1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:npm/next@16.0.11" }, { "url": "http://public2.vulnerablecode.io/api/packages/61646?format=api", "purl": "pkg:npm/next@16.1.5", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5kj1-stm6-8qgv" }, { "vulnerability": "VCID-6rmp-13nt-2kb9" }, { "vulnerability": "VCID-7skv-ksvn-f7bu" }, { "vulnerability": "VCID-qz2s-22e2-ufg9" }, { "vulnerability": "VCID-wa6u-pkgn-cbaf" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:npm/next@16.1.5" } ], "aliases": [ "GHSA-h25m-26qc-wcjf" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-w35n-bwuy-5kce" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/20657?format=api", "vulnerability_id": "VCID-xv6q-hbf8-b7b1", "summary": "Next.js self-hosted applications vulnerable to DoS via Image Optimizer remotePatterns configuration\nA DoS vulnerability exists in self-hosted Next.js applications that have `remotePatterns` configured for the Image Optimizer. The image optimization endpoint (`/_next/image`) loads external images entirely into memory without enforcing a maximum size limit, allowing an attacker to cause out-of-memory conditions by requesting optimization of arbitrarily large images. This vulnerability requires that `remotePatterns` is configured to allow image optimization from external domains and that the attacker can serve or control a large image on an allowed domain.\n\nStrongly consider upgrading to 15.5.10 and 16.1.5 to reduce risk and prevent availability issues in Next applications.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-59471.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-59471.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-59471", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07214", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07769", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07692", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07661", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07721", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07739", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07738", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07724", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07708", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07633", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07621", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-59471" }, { "reference_url": "https://github.com/vercel/next.js", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/vercel/next.js" }, { "reference_url": "https://github.com/vercel/next.js/commit/500ec83743639addceaede95e95913398975156c", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/vercel/next.js/commit/500ec83743639addceaede95e95913398975156c" }, { "reference_url": "https://github.com/vercel/next.js/commit/e5b834d208fe0edf64aa26b5d76dcf6a176500ec", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/vercel/next.js/commit/e5b834d208fe0edf64aa26b5d76dcf6a176500ec" }, { "reference_url": "https://github.com/vercel/next.js/releases/tag/v15.5.10", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/vercel/next.js/releases/tag/v15.5.10" }, { "reference_url": "https://github.com/vercel/next.js/releases/tag/v16.1.5", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/vercel/next.js/releases/tag/v16.1.5" }, { "reference_url": "https://github.com/vercel/next.js/security/advisories/GHSA-9g9p-9gw9-jx7f", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "MODERATE", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-27T14:54:47Z/" } ], "url": "https://github.com/vercel/next.js/security/advisories/GHSA-9g9p-9gw9-jx7f" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2025-59471", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-59471" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2433094", "reference_id": "2433094", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2433094" }, { "reference_url": "https://github.com/advisories/GHSA-9g9p-9gw9-jx7f", "reference_id": "GHSA-9g9p-9gw9-jx7f", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" } ], "url": "https://github.com/advisories/GHSA-9g9p-9gw9-jx7f" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/61643?format=api", "purl": "pkg:npm/next@15.5.10", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3m4d-v2y1-5ua4" }, { "vulnerability": "VCID-5kj1-stm6-8qgv" }, { "vulnerability": "VCID-qz2s-22e2-ufg9" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:npm/next@15.5.10" }, { "url": "http://public2.vulnerablecode.io/api/packages/61646?format=api", "purl": "pkg:npm/next@16.1.5", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5kj1-stm6-8qgv" }, { "vulnerability": "VCID-6rmp-13nt-2kb9" }, { "vulnerability": "VCID-7skv-ksvn-f7bu" }, { "vulnerability": "VCID-qz2s-22e2-ufg9" }, { "vulnerability": "VCID-wa6u-pkgn-cbaf" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:npm/next@16.1.5" } ], "aliases": [ "CVE-2025-59471", "GHSA-9g9p-9gw9-jx7f" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xv6q-hbf8-b7b1" } ], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/23886?format=api", "vulnerability_id": "VCID-1qzn-gxkv-wye3", "summary": "Next Vulnerable to Denial of Service with Server Components\nA vulnerability affects certain React packages for versions 19.0.0, 19.0.1, 19.1.0, 19.1.1, 19.1.2, 19.2.0, and 19.2.1 and frameworks that use the affected packages, including Next.js 15.x and 16.x using the App Router. The issue is tracked upstream as [CVE-2025-55184](https://www.cve.org/CVERecord?id=CVE-2025-55184).\n\nA malicious HTTP request can be crafted and sent to any App Router endpoint that, when deserialized, can cause the server process to hang and consume CPU. This can result in denial of service in unpatched environments.", "references": [ { "reference_url": "https://github.com/vercel/next.js", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/vercel/next.js" }, { "reference_url": "https://nextjs.org/blog/security-update-2025-12-11", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://nextjs.org/blog/security-update-2025-12-11" }, { "reference_url": "https://www.cve.org/CVERecord?id=CVE-2025-55184", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.cve.org/CVERecord?id=CVE-2025-55184" }, { "reference_url": "https://github.com/advisories/GHSA-mwv6-3258-q52c", "reference_id": "GHSA-mwv6-3258-q52c", "reference_type": "", "scores": [ { "value": "HIGH", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" } ], "url": "https://github.com/advisories/GHSA-mwv6-3258-q52c" }, { "reference_url": "https://github.com/vercel/next.js/security/advisories/GHSA-mwv6-3258-q52c", "reference_id": "GHSA-mwv6-3258-q52c", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/vercel/next.js/security/advisories/GHSA-mwv6-3258-q52c" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/66942?format=api", "purl": "pkg:npm/next@14.2.34", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5kj1-stm6-8qgv" }, { "vulnerability": "VCID-fpzm-tpp7-jbft" }, { "vulnerability": "VCID-qz2s-22e2-ufg9" }, { "vulnerability": "VCID-w35n-bwuy-5kce" }, { "vulnerability": "VCID-xv6q-hbf8-b7b1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:npm/next@14.2.34" }, { "url": "http://public2.vulnerablecode.io/api/packages/767029?format=api", "purl": "pkg:npm/next@14.3.0-canary.0", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5kj1-stm6-8qgv" }, { "vulnerability": "VCID-qz2s-22e2-ufg9" }, { "vulnerability": "VCID-w35n-bwuy-5kce" }, { "vulnerability": "VCID-xv6q-hbf8-b7b1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:npm/next@14.3.0-canary.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/66925?format=api", "purl": "pkg:npm/next@15.0.6", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3m4d-v2y1-5ua4" }, { "vulnerability": "VCID-5kj1-stm6-8qgv" }, { "vulnerability": "VCID-fpzm-tpp7-jbft" }, { "vulnerability": "VCID-qz2s-22e2-ufg9" }, { "vulnerability": "VCID-w35n-bwuy-5kce" }, { "vulnerability": "VCID-xv6q-hbf8-b7b1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:npm/next@15.0.6" }, { "url": "http://public2.vulnerablecode.io/api/packages/578528?format=api", "purl": "pkg:npm/next@15.1.0", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3m4d-v2y1-5ua4" }, { "vulnerability": "VCID-3szn-4nn4-3fek" }, { "vulnerability": "VCID-54qu-9bx2-9ka8" }, { "vulnerability": "VCID-5kj1-stm6-8qgv" }, { "vulnerability": "VCID-dyak-ybr6-fyhy" }, { "vulnerability": "VCID-jst7-263v-1ydx" }, { "vulnerability": "VCID-pqwe-3ukm-dkh4" }, { "vulnerability": "VCID-qz2s-22e2-ufg9" }, { "vulnerability": "VCID-r4pw-m8mz-xbdq" }, { "vulnerability": "VCID-sjdx-v2z6-3fcw" }, { "vulnerability": "VCID-ub68-nqch-bkdm" }, { "vulnerability": "VCID-vwym-qr5h-fue8" }, { "vulnerability": "VCID-xv6q-hbf8-b7b1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:npm/next@15.1.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/66926?format=api", "purl": "pkg:npm/next@15.1.10", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3m4d-v2y1-5ua4" }, { "vulnerability": "VCID-5kj1-stm6-8qgv" }, { "vulnerability": "VCID-fpzm-tpp7-jbft" }, { "vulnerability": "VCID-qz2s-22e2-ufg9" }, { "vulnerability": "VCID-w35n-bwuy-5kce" }, { "vulnerability": "VCID-xv6q-hbf8-b7b1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:npm/next@15.1.10" }, { "url": "http://public2.vulnerablecode.io/api/packages/66927?format=api", "purl": "pkg:npm/next@15.2.7", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3m4d-v2y1-5ua4" }, { "vulnerability": "VCID-5kj1-stm6-8qgv" }, { "vulnerability": "VCID-fpzm-tpp7-jbft" }, { "vulnerability": "VCID-qz2s-22e2-ufg9" }, { "vulnerability": "VCID-w35n-bwuy-5kce" }, { "vulnerability": "VCID-xv6q-hbf8-b7b1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:npm/next@15.2.7" }, { "url": "http://public2.vulnerablecode.io/api/packages/66928?format=api", "purl": "pkg:npm/next@15.3.7", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3m4d-v2y1-5ua4" }, { "vulnerability": "VCID-5kj1-stm6-8qgv" }, { "vulnerability": "VCID-fpzm-tpp7-jbft" }, { "vulnerability": "VCID-qz2s-22e2-ufg9" }, { "vulnerability": "VCID-w35n-bwuy-5kce" }, { "vulnerability": "VCID-xv6q-hbf8-b7b1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:npm/next@15.3.7" }, { "url": "http://public2.vulnerablecode.io/api/packages/66929?format=api", "purl": "pkg:npm/next@15.4.9", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3m4d-v2y1-5ua4" }, { "vulnerability": "VCID-5kj1-stm6-8qgv" }, { "vulnerability": "VCID-fpzm-tpp7-jbft" }, { "vulnerability": "VCID-qz2s-22e2-ufg9" }, { "vulnerability": "VCID-w35n-bwuy-5kce" }, { "vulnerability": "VCID-xv6q-hbf8-b7b1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:npm/next@15.4.9" }, { "url": "http://public2.vulnerablecode.io/api/packages/855099?format=api", "purl": "pkg:npm/next@15.5.0", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3m4d-v2y1-5ua4" }, { "vulnerability": "VCID-5kj1-stm6-8qgv" }, { "vulnerability": "VCID-pqwe-3ukm-dkh4" }, { "vulnerability": "VCID-qz2s-22e2-ufg9" }, { "vulnerability": "VCID-xv6q-hbf8-b7b1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:npm/next@15.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/66930?format=api", "purl": "pkg:npm/next@15.5.8", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3m4d-v2y1-5ua4" }, { "vulnerability": "VCID-5kj1-stm6-8qgv" }, { "vulnerability": "VCID-fpzm-tpp7-jbft" }, { "vulnerability": "VCID-qz2s-22e2-ufg9" }, { "vulnerability": "VCID-w35n-bwuy-5kce" }, { "vulnerability": "VCID-xv6q-hbf8-b7b1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:npm/next@15.5.8" }, { "url": "http://public2.vulnerablecode.io/api/packages/66931?format=api", "purl": "pkg:npm/next@15.6.0-canary.59", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3m4d-v2y1-5ua4" }, { "vulnerability": "VCID-fpzm-tpp7-jbft" }, { "vulnerability": "VCID-w35n-bwuy-5kce" }, { "vulnerability": "VCID-xv6q-hbf8-b7b1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:npm/next@15.6.0-canary.59" }, { "url": "http://public2.vulnerablecode.io/api/packages/66932?format=api", "purl": "pkg:npm/next@16.0.9", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3m4d-v2y1-5ua4" }, { "vulnerability": "VCID-5kj1-stm6-8qgv" }, { "vulnerability": "VCID-6rmp-13nt-2kb9" }, { "vulnerability": "VCID-7skv-ksvn-f7bu" }, { "vulnerability": "VCID-fpzm-tpp7-jbft" }, { "vulnerability": "VCID-qz2s-22e2-ufg9" }, { "vulnerability": "VCID-w35n-bwuy-5kce" }, { "vulnerability": "VCID-wa6u-pkgn-cbaf" }, { "vulnerability": "VCID-xv6q-hbf8-b7b1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:npm/next@16.0.9" }, { "url": "http://public2.vulnerablecode.io/api/packages/66933?format=api", "purl": "pkg:npm/next@16.1.0-canary.17", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3m4d-v2y1-5ua4" }, { "vulnerability": "VCID-5kj1-stm6-8qgv" }, { "vulnerability": "VCID-6rmp-13nt-2kb9" }, { "vulnerability": "VCID-7skv-ksvn-f7bu" }, { "vulnerability": "VCID-fpzm-tpp7-jbft" }, { "vulnerability": "VCID-qz2s-22e2-ufg9" }, { "vulnerability": "VCID-w35n-bwuy-5kce" }, { "vulnerability": "VCID-wa6u-pkgn-cbaf" }, { "vulnerability": "VCID-xv6q-hbf8-b7b1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:npm/next@16.1.0-canary.17" } ], "aliases": [ "GHSA-mwv6-3258-q52c" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1qzn-gxkv-wye3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/23871?format=api", "vulnerability_id": "VCID-2tah-y5sg-hugp", "summary": "Next Server Actions Source Code Exposure\nA vulnerability affects certain React packages for versions 19.0.0, 19.0.1, 19.1.0, 19.1.1, 19.1.2, 19.2.0, and 19.2.1 and frameworks that use the affected packages, including Next.js 15.x and 16.x using the App Router. The issue is tracked upstream as [CVE-2025-55183](https://www.cve.org/CVERecord?id=CVE-2025-55183).\n\nA malicious HTTP request can be crafted and sent to any App Router endpoint that can return the compiled source code of [Server Functions](https://react.dev/reference/rsc/server-functions). This could reveal business logic, but would not expose secrets unless they were hardcoded directly into [Server Function](https://react.dev/reference/rsc/server-functions) code.", "references": [ { "reference_url": "https://github.com/vercel/next.js", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/vercel/next.js" }, { "reference_url": "https://nextjs.org/blog/security-update-2025-12-11", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://nextjs.org/blog/security-update-2025-12-11" }, { "reference_url": "https://www.cve.org/CVERecord?id=CVE-2025-55183", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.cve.org/CVERecord?id=CVE-2025-55183" }, { "reference_url": "https://github.com/advisories/GHSA-w37m-7fhw-fmv9", "reference_id": "GHSA-w37m-7fhw-fmv9", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" } ], "url": "https://github.com/advisories/GHSA-w37m-7fhw-fmv9" }, { "reference_url": "https://github.com/vercel/next.js/security/advisories/GHSA-w37m-7fhw-fmv9", "reference_id": "GHSA-w37m-7fhw-fmv9", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" }, { "value": "MODERATE", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/vercel/next.js/security/advisories/GHSA-w37m-7fhw-fmv9" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/66925?format=api", "purl": "pkg:npm/next@15.0.6", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3m4d-v2y1-5ua4" }, { "vulnerability": "VCID-5kj1-stm6-8qgv" }, { "vulnerability": "VCID-fpzm-tpp7-jbft" }, { "vulnerability": "VCID-qz2s-22e2-ufg9" }, { "vulnerability": "VCID-w35n-bwuy-5kce" }, { "vulnerability": "VCID-xv6q-hbf8-b7b1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:npm/next@15.0.6" }, { "url": "http://public2.vulnerablecode.io/api/packages/578528?format=api", "purl": "pkg:npm/next@15.1.0", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3m4d-v2y1-5ua4" }, { "vulnerability": "VCID-3szn-4nn4-3fek" }, { "vulnerability": "VCID-54qu-9bx2-9ka8" }, { "vulnerability": "VCID-5kj1-stm6-8qgv" }, { "vulnerability": "VCID-dyak-ybr6-fyhy" }, { "vulnerability": "VCID-jst7-263v-1ydx" }, { "vulnerability": "VCID-pqwe-3ukm-dkh4" }, { "vulnerability": "VCID-qz2s-22e2-ufg9" }, { "vulnerability": "VCID-r4pw-m8mz-xbdq" }, { "vulnerability": "VCID-sjdx-v2z6-3fcw" }, { "vulnerability": "VCID-ub68-nqch-bkdm" }, { "vulnerability": "VCID-vwym-qr5h-fue8" }, { "vulnerability": "VCID-xv6q-hbf8-b7b1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:npm/next@15.1.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/66926?format=api", "purl": "pkg:npm/next@15.1.10", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3m4d-v2y1-5ua4" }, { "vulnerability": "VCID-5kj1-stm6-8qgv" }, { "vulnerability": "VCID-fpzm-tpp7-jbft" }, { "vulnerability": "VCID-qz2s-22e2-ufg9" }, { "vulnerability": "VCID-w35n-bwuy-5kce" }, { "vulnerability": "VCID-xv6q-hbf8-b7b1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:npm/next@15.1.10" }, { "url": "http://public2.vulnerablecode.io/api/packages/66927?format=api", "purl": "pkg:npm/next@15.2.7", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3m4d-v2y1-5ua4" }, { "vulnerability": "VCID-5kj1-stm6-8qgv" }, { "vulnerability": "VCID-fpzm-tpp7-jbft" }, { "vulnerability": "VCID-qz2s-22e2-ufg9" }, { "vulnerability": "VCID-w35n-bwuy-5kce" }, { "vulnerability": "VCID-xv6q-hbf8-b7b1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:npm/next@15.2.7" }, { "url": "http://public2.vulnerablecode.io/api/packages/66928?format=api", "purl": "pkg:npm/next@15.3.7", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3m4d-v2y1-5ua4" }, { "vulnerability": "VCID-5kj1-stm6-8qgv" }, { "vulnerability": "VCID-fpzm-tpp7-jbft" }, { "vulnerability": "VCID-qz2s-22e2-ufg9" }, { "vulnerability": "VCID-w35n-bwuy-5kce" }, { "vulnerability": "VCID-xv6q-hbf8-b7b1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:npm/next@15.3.7" }, { "url": "http://public2.vulnerablecode.io/api/packages/66929?format=api", "purl": "pkg:npm/next@15.4.9", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3m4d-v2y1-5ua4" }, { "vulnerability": "VCID-5kj1-stm6-8qgv" }, { "vulnerability": "VCID-fpzm-tpp7-jbft" }, { "vulnerability": "VCID-qz2s-22e2-ufg9" }, { "vulnerability": "VCID-w35n-bwuy-5kce" }, { "vulnerability": "VCID-xv6q-hbf8-b7b1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:npm/next@15.4.9" }, { "url": "http://public2.vulnerablecode.io/api/packages/855099?format=api", "purl": "pkg:npm/next@15.5.0", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3m4d-v2y1-5ua4" }, { "vulnerability": "VCID-5kj1-stm6-8qgv" }, { "vulnerability": "VCID-pqwe-3ukm-dkh4" }, { "vulnerability": "VCID-qz2s-22e2-ufg9" }, { "vulnerability": "VCID-xv6q-hbf8-b7b1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:npm/next@15.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/66930?format=api", "purl": "pkg:npm/next@15.5.8", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3m4d-v2y1-5ua4" }, { "vulnerability": "VCID-5kj1-stm6-8qgv" }, { "vulnerability": "VCID-fpzm-tpp7-jbft" }, { "vulnerability": "VCID-qz2s-22e2-ufg9" }, { "vulnerability": "VCID-w35n-bwuy-5kce" }, { "vulnerability": "VCID-xv6q-hbf8-b7b1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:npm/next@15.5.8" }, { "url": "http://public2.vulnerablecode.io/api/packages/66931?format=api", "purl": "pkg:npm/next@15.6.0-canary.59", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3m4d-v2y1-5ua4" }, { "vulnerability": "VCID-fpzm-tpp7-jbft" }, { "vulnerability": "VCID-w35n-bwuy-5kce" }, { "vulnerability": "VCID-xv6q-hbf8-b7b1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:npm/next@15.6.0-canary.59" }, { "url": "http://public2.vulnerablecode.io/api/packages/66932?format=api", "purl": "pkg:npm/next@16.0.9", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3m4d-v2y1-5ua4" }, { "vulnerability": "VCID-5kj1-stm6-8qgv" }, { "vulnerability": "VCID-6rmp-13nt-2kb9" }, { "vulnerability": "VCID-7skv-ksvn-f7bu" }, { "vulnerability": "VCID-fpzm-tpp7-jbft" }, { "vulnerability": "VCID-qz2s-22e2-ufg9" }, { "vulnerability": "VCID-w35n-bwuy-5kce" }, { "vulnerability": "VCID-wa6u-pkgn-cbaf" }, { "vulnerability": "VCID-xv6q-hbf8-b7b1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:npm/next@16.0.9" }, { "url": "http://public2.vulnerablecode.io/api/packages/66933?format=api", "purl": "pkg:npm/next@16.1.0-canary.17", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3m4d-v2y1-5ua4" }, { "vulnerability": "VCID-5kj1-stm6-8qgv" }, { "vulnerability": "VCID-6rmp-13nt-2kb9" }, { "vulnerability": "VCID-7skv-ksvn-f7bu" }, { "vulnerability": "VCID-fpzm-tpp7-jbft" }, { "vulnerability": "VCID-qz2s-22e2-ufg9" }, { "vulnerability": "VCID-w35n-bwuy-5kce" }, { "vulnerability": "VCID-wa6u-pkgn-cbaf" }, { "vulnerability": "VCID-xv6q-hbf8-b7b1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:npm/next@16.1.0-canary.17" } ], "aliases": [ "GHSA-w37m-7fhw-fmv9" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2tah-y5sg-hugp" } ], "risk_score": "4.0", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:npm/next@15.1.10" }