Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/801996?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/801996?format=api", "purl": "pkg:npm/next@15.4.0-canary.58", "type": "npm", "namespace": "", "name": "next", "version": "15.4.0-canary.58", "qualifiers": {}, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": "15.5.14", "latest_non_vulnerable_version": "16.2.3", "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/23886?format=api", "vulnerability_id": "VCID-1qzn-gxkv-wye3", "summary": "Next Vulnerable to Denial of Service with Server Components\nA vulnerability affects certain React packages for versions 19.0.0, 19.0.1, 19.1.0, 19.1.1, 19.1.2, 19.2.0, and 19.2.1 and frameworks that use the affected packages, including Next.js 15.x and 16.x using the App Router. The issue is tracked upstream as [CVE-2025-55184](https://www.cve.org/CVERecord?id=CVE-2025-55184).\n\nA malicious HTTP request can be crafted and sent to any App Router endpoint that, when deserialized, can cause the server process to hang and consume CPU. This can result in denial of service in unpatched environments.", "references": [ { "reference_url": "https://github.com/vercel/next.js", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/vercel/next.js" }, { "reference_url": "https://nextjs.org/blog/security-update-2025-12-11", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://nextjs.org/blog/security-update-2025-12-11" }, { "reference_url": "https://www.cve.org/CVERecord?id=CVE-2025-55184", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.cve.org/CVERecord?id=CVE-2025-55184" }, { "reference_url": "https://github.com/advisories/GHSA-mwv6-3258-q52c", "reference_id": "GHSA-mwv6-3258-q52c", "reference_type": "", "scores": [ { "value": "HIGH", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" } ], "url": "https://github.com/advisories/GHSA-mwv6-3258-q52c" }, { "reference_url": "https://github.com/vercel/next.js/security/advisories/GHSA-mwv6-3258-q52c", "reference_id": "GHSA-mwv6-3258-q52c", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/vercel/next.js/security/advisories/GHSA-mwv6-3258-q52c" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/66929?format=api", "purl": "pkg:npm/next@15.4.9", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3m4d-v2y1-5ua4" }, { "vulnerability": "VCID-5kj1-stm6-8qgv" }, { "vulnerability": "VCID-fpzm-tpp7-jbft" }, { "vulnerability": "VCID-qz2s-22e2-ufg9" }, { "vulnerability": "VCID-w35n-bwuy-5kce" }, { "vulnerability": "VCID-xv6q-hbf8-b7b1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:npm/next@15.4.9" }, { "url": "http://public2.vulnerablecode.io/api/packages/855099?format=api", "purl": "pkg:npm/next@15.5.0", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3m4d-v2y1-5ua4" }, { "vulnerability": "VCID-5kj1-stm6-8qgv" }, { "vulnerability": "VCID-pqwe-3ukm-dkh4" }, { "vulnerability": "VCID-qz2s-22e2-ufg9" }, { "vulnerability": "VCID-xv6q-hbf8-b7b1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:npm/next@15.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/66930?format=api", "purl": "pkg:npm/next@15.5.8", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3m4d-v2y1-5ua4" }, { "vulnerability": "VCID-5kj1-stm6-8qgv" }, { "vulnerability": "VCID-fpzm-tpp7-jbft" }, { "vulnerability": "VCID-qz2s-22e2-ufg9" }, { "vulnerability": "VCID-w35n-bwuy-5kce" }, { "vulnerability": "VCID-xv6q-hbf8-b7b1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:npm/next@15.5.8" }, { "url": "http://public2.vulnerablecode.io/api/packages/66931?format=api", "purl": "pkg:npm/next@15.6.0-canary.59", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3m4d-v2y1-5ua4" }, { "vulnerability": "VCID-fpzm-tpp7-jbft" }, { "vulnerability": "VCID-w35n-bwuy-5kce" }, { "vulnerability": "VCID-xv6q-hbf8-b7b1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:npm/next@15.6.0-canary.59" }, { "url": "http://public2.vulnerablecode.io/api/packages/66932?format=api", "purl": "pkg:npm/next@16.0.9", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3m4d-v2y1-5ua4" }, { "vulnerability": "VCID-5kj1-stm6-8qgv" }, { "vulnerability": "VCID-6rmp-13nt-2kb9" }, { "vulnerability": "VCID-7skv-ksvn-f7bu" }, { "vulnerability": "VCID-fpzm-tpp7-jbft" }, { "vulnerability": "VCID-qz2s-22e2-ufg9" }, { "vulnerability": "VCID-w35n-bwuy-5kce" }, { "vulnerability": "VCID-wa6u-pkgn-cbaf" }, { "vulnerability": "VCID-xv6q-hbf8-b7b1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:npm/next@16.0.9" }, { "url": "http://public2.vulnerablecode.io/api/packages/66933?format=api", "purl": "pkg:npm/next@16.1.0-canary.17", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3m4d-v2y1-5ua4" }, { "vulnerability": "VCID-5kj1-stm6-8qgv" }, { "vulnerability": "VCID-6rmp-13nt-2kb9" }, { "vulnerability": "VCID-7skv-ksvn-f7bu" }, { "vulnerability": "VCID-fpzm-tpp7-jbft" }, { "vulnerability": "VCID-qz2s-22e2-ufg9" }, { "vulnerability": "VCID-w35n-bwuy-5kce" }, { "vulnerability": "VCID-wa6u-pkgn-cbaf" }, { "vulnerability": "VCID-xv6q-hbf8-b7b1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:npm/next@16.1.0-canary.17" } ], "aliases": [ "GHSA-mwv6-3258-q52c" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1qzn-gxkv-wye3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/23871?format=api", "vulnerability_id": "VCID-2tah-y5sg-hugp", "summary": "Next Server Actions Source Code Exposure\nA vulnerability affects certain React packages for versions 19.0.0, 19.0.1, 19.1.0, 19.1.1, 19.1.2, 19.2.0, and 19.2.1 and frameworks that use the affected packages, including Next.js 15.x and 16.x using the App Router. The issue is tracked upstream as [CVE-2025-55183](https://www.cve.org/CVERecord?id=CVE-2025-55183).\n\nA malicious HTTP request can be crafted and sent to any App Router endpoint that can return the compiled source code of [Server Functions](https://react.dev/reference/rsc/server-functions). This could reveal business logic, but would not expose secrets unless they were hardcoded directly into [Server Function](https://react.dev/reference/rsc/server-functions) code.", "references": [ { "reference_url": "https://github.com/vercel/next.js", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/vercel/next.js" }, { "reference_url": "https://nextjs.org/blog/security-update-2025-12-11", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://nextjs.org/blog/security-update-2025-12-11" }, { "reference_url": "https://www.cve.org/CVERecord?id=CVE-2025-55183", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.cve.org/CVERecord?id=CVE-2025-55183" }, { "reference_url": "https://github.com/advisories/GHSA-w37m-7fhw-fmv9", "reference_id": "GHSA-w37m-7fhw-fmv9", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" } ], "url": "https://github.com/advisories/GHSA-w37m-7fhw-fmv9" }, { "reference_url": "https://github.com/vercel/next.js/security/advisories/GHSA-w37m-7fhw-fmv9", "reference_id": "GHSA-w37m-7fhw-fmv9", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" }, { "value": "MODERATE", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/vercel/next.js/security/advisories/GHSA-w37m-7fhw-fmv9" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/66929?format=api", "purl": "pkg:npm/next@15.4.9", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3m4d-v2y1-5ua4" }, { "vulnerability": "VCID-5kj1-stm6-8qgv" }, { "vulnerability": "VCID-fpzm-tpp7-jbft" }, { "vulnerability": "VCID-qz2s-22e2-ufg9" }, { "vulnerability": "VCID-w35n-bwuy-5kce" }, { "vulnerability": "VCID-xv6q-hbf8-b7b1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:npm/next@15.4.9" }, { "url": "http://public2.vulnerablecode.io/api/packages/855099?format=api", "purl": "pkg:npm/next@15.5.0", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3m4d-v2y1-5ua4" }, { "vulnerability": "VCID-5kj1-stm6-8qgv" }, { "vulnerability": "VCID-pqwe-3ukm-dkh4" }, { "vulnerability": "VCID-qz2s-22e2-ufg9" }, { "vulnerability": "VCID-xv6q-hbf8-b7b1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:npm/next@15.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/66930?format=api", "purl": "pkg:npm/next@15.5.8", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3m4d-v2y1-5ua4" }, { "vulnerability": "VCID-5kj1-stm6-8qgv" }, { "vulnerability": "VCID-fpzm-tpp7-jbft" }, { "vulnerability": "VCID-qz2s-22e2-ufg9" }, { "vulnerability": "VCID-w35n-bwuy-5kce" }, { "vulnerability": "VCID-xv6q-hbf8-b7b1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:npm/next@15.5.8" }, { "url": "http://public2.vulnerablecode.io/api/packages/66931?format=api", "purl": "pkg:npm/next@15.6.0-canary.59", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3m4d-v2y1-5ua4" }, { "vulnerability": "VCID-fpzm-tpp7-jbft" }, { "vulnerability": "VCID-w35n-bwuy-5kce" }, { "vulnerability": "VCID-xv6q-hbf8-b7b1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:npm/next@15.6.0-canary.59" }, { "url": "http://public2.vulnerablecode.io/api/packages/66932?format=api", "purl": "pkg:npm/next@16.0.9", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3m4d-v2y1-5ua4" }, { "vulnerability": "VCID-5kj1-stm6-8qgv" }, { "vulnerability": "VCID-6rmp-13nt-2kb9" }, { "vulnerability": "VCID-7skv-ksvn-f7bu" }, { "vulnerability": "VCID-fpzm-tpp7-jbft" }, { "vulnerability": "VCID-qz2s-22e2-ufg9" }, { "vulnerability": "VCID-w35n-bwuy-5kce" }, { "vulnerability": "VCID-wa6u-pkgn-cbaf" }, { "vulnerability": "VCID-xv6q-hbf8-b7b1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:npm/next@16.0.9" }, { "url": "http://public2.vulnerablecode.io/api/packages/66933?format=api", "purl": "pkg:npm/next@16.1.0-canary.17", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3m4d-v2y1-5ua4" }, { "vulnerability": "VCID-5kj1-stm6-8qgv" }, { "vulnerability": "VCID-6rmp-13nt-2kb9" }, { "vulnerability": "VCID-7skv-ksvn-f7bu" }, { "vulnerability": "VCID-fpzm-tpp7-jbft" }, { "vulnerability": "VCID-qz2s-22e2-ufg9" }, { "vulnerability": "VCID-w35n-bwuy-5kce" }, { "vulnerability": "VCID-wa6u-pkgn-cbaf" }, { "vulnerability": "VCID-xv6q-hbf8-b7b1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:npm/next@16.1.0-canary.17" } ], "aliases": [ "GHSA-w37m-7fhw-fmv9" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2tah-y5sg-hugp" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/20448?format=api", "vulnerability_id": "VCID-3m4d-v2y1-5ua4", "summary": "Next.js has Unbounded Memory Consumption via PPR Resume Endpoint\nA denial of service vulnerability exists in Next.js versions with Partial Prerendering (PPR) enabled when running in minimal mode. The PPR resume endpoint accepts unauthenticated POST requests with the `Next-Resume: 1` header and processes attacker-controlled postponed state data. Two closely related vulnerabilities allow an attacker to crash the server process through memory exhaustion:\n\n1. **Unbounded request body buffering**: The server buffers the entire POST request body into memory using `Buffer.concat()` without enforcing any size limit, allowing arbitrarily large payloads to exhaust available memory.\n\n2. **Unbounded decompression (zipbomb)**: The resume data cache is decompressed using `inflateSync()` without limiting the decompressed output size. A small compressed payload can expand to hundreds of megabytes or gigabytes, causing memory exhaustion.\n\nBoth attack vectors result in a fatal V8 out-of-memory error (`FATAL ERROR: Reached heap limit Allocation failed - JavaScript heap out of memory`) causing the Node.js process to terminate. The zipbomb variant is particularly dangerous as it can bypass reverse proxy request size limits while still causing large memory allocation on the server.\n\nTo be affected, an application must run with `experimental.ppr: true` or `cacheComponents: true` configured along with the NEXT_PRIVATE_MINIMAL_MODE=1 environment variable.\n\nStrongly consider upgrading to 15.6.0-canary.61 or 16.1.5 to reduce risk and prevent availability issues in Next applications.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-59472.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-59472.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-59472", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.2486", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00089", "scoring_system": "epss", "scoring_elements": "0.25313", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00089", "scoring_system": "epss", "scoring_elements": "0.25543", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00089", "scoring_system": "epss", "scoring_elements": "0.25315", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00089", "scoring_system": "epss", "scoring_elements": "0.25383", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00089", "scoring_system": "epss", "scoring_elements": "0.25428", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00089", "scoring_system": "epss", "scoring_elements": "0.25439", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00089", "scoring_system": "epss", "scoring_elements": "0.25398", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00089", "scoring_system": "epss", "scoring_elements": "0.25344", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00089", "scoring_system": "epss", "scoring_elements": "0.25352", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00089", "scoring_system": "epss", "scoring_elements": "0.25343", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-59472" }, { "reference_url": "https://github.com/vercel/next.js", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/vercel/next.js" }, { "reference_url": "https://github.com/vercel/next.js/security/advisories/GHSA-5f7q-jpqc-wp7h", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "MODERATE", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-27T14:52:42Z/" } ], "url": "https://github.com/vercel/next.js/security/advisories/GHSA-5f7q-jpqc-wp7h" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2025-59472", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-59472" }, { "reference_url": "https://vercel.com/changelog/summaries-of-cve-2025-59471-and-cve-2025-59472", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://vercel.com/changelog/summaries-of-cve-2025-59471-and-cve-2025-59472" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2433092", "reference_id": "2433092", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2433092" }, { "reference_url": "https://github.com/advisories/GHSA-5f7q-jpqc-wp7h", "reference_id": "GHSA-5f7q-jpqc-wp7h", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" } ], "url": "https://github.com/advisories/GHSA-5f7q-jpqc-wp7h" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/802066?format=api", "purl": "pkg:npm/next@15.4.0", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1qzn-gxkv-wye3" }, { "vulnerability": "VCID-2tah-y5sg-hugp" }, { "vulnerability": "VCID-3m4d-v2y1-5ua4" }, { "vulnerability": "VCID-54qu-9bx2-9ka8" }, { "vulnerability": "VCID-5kj1-stm6-8qgv" }, { "vulnerability": "VCID-pqwe-3ukm-dkh4" }, { "vulnerability": "VCID-qz2s-22e2-ufg9" }, { "vulnerability": "VCID-r4pw-m8mz-xbdq" }, { "vulnerability": "VCID-sjdx-v2z6-3fcw" }, { "vulnerability": "VCID-w35n-bwuy-5kce" }, { "vulnerability": "VCID-xv6q-hbf8-b7b1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:npm/next@15.4.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/802124?format=api", "purl": "pkg:npm/next@15.4.2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1qzn-gxkv-wye3" }, { "vulnerability": "VCID-2tah-y5sg-hugp" }, { "vulnerability": "VCID-3m4d-v2y1-5ua4" }, { "vulnerability": "VCID-54qu-9bx2-9ka8" }, { "vulnerability": "VCID-5kj1-stm6-8qgv" }, { "vulnerability": "VCID-pqwe-3ukm-dkh4" }, { "vulnerability": "VCID-qz2s-22e2-ufg9" }, { "vulnerability": "VCID-r4pw-m8mz-xbdq" }, { "vulnerability": "VCID-sjdx-v2z6-3fcw" }, { "vulnerability": "VCID-w35n-bwuy-5kce" }, { "vulnerability": "VCID-xv6q-hbf8-b7b1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:npm/next@15.4.2" }, { "url": "http://public2.vulnerablecode.io/api/packages/855139?format=api", "purl": "pkg:npm/next@15.5.1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1qzn-gxkv-wye3" }, { "vulnerability": "VCID-2tah-y5sg-hugp" }, { "vulnerability": "VCID-3m4d-v2y1-5ua4" }, { "vulnerability": "VCID-5kj1-stm6-8qgv" }, { "vulnerability": "VCID-pqwe-3ukm-dkh4" }, { "vulnerability": "VCID-qz2s-22e2-ufg9" }, { "vulnerability": "VCID-w35n-bwuy-5kce" }, { "vulnerability": "VCID-xv6q-hbf8-b7b1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:npm/next@15.5.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/61644?format=api", "purl": "pkg:npm/next@15.6.0-canary.61", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-xv6q-hbf8-b7b1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:npm/next@15.6.0-canary.61" }, { "url": "http://public2.vulnerablecode.io/api/packages/61646?format=api", "purl": "pkg:npm/next@16.1.5", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5kj1-stm6-8qgv" }, { "vulnerability": "VCID-6rmp-13nt-2kb9" }, { "vulnerability": "VCID-7skv-ksvn-f7bu" }, { "vulnerability": "VCID-qz2s-22e2-ufg9" }, { "vulnerability": "VCID-wa6u-pkgn-cbaf" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:npm/next@16.1.5" } ], "aliases": [ "CVE-2025-59472", "GHSA-5f7q-jpqc-wp7h" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3m4d-v2y1-5ua4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/27932?format=api", "vulnerability_id": "VCID-54qu-9bx2-9ka8", "summary": "Next.js Improper Middleware Redirect Handling Leads to SSRF\nA vulnerability in **Next.js Middleware** has been fixed in **v14.2.32** and **v15.4.7**. The issue occurred when request headers were directly passed into `NextResponse.next()`. In self-hosted applications, this could allow Server-Side Request Forgery (SSRF) if certain sensitive headers from the incoming request were reflected back into the response.\n\nAll users implementing custom middleware logic in self-hosted environments are strongly encouraged to upgrade and verify correct usage of the `next()` function.\n\nMore details at [Vercel Changelog](https://vercel.com/changelog/cve-2025-57822)", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-57822", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.05626", "scoring_system": "epss", "scoring_elements": "0.90302", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.05626", "scoring_system": "epss", "scoring_elements": "0.90333", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.05626", "scoring_system": "epss", "scoring_elements": "0.90319", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.05626", "scoring_system": "epss", "scoring_elements": "0.90314", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.05626", "scoring_system": "epss", "scoring_elements": "0.90357", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.05626", "scoring_system": "epss", "scoring_elements": "0.90341", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.05626", "scoring_system": "epss", "scoring_elements": "0.90348", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.05626", "scoring_system": "epss", "scoring_elements": "0.9034", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.06479", "scoring_system": "epss", "scoring_elements": "0.91113", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-57822" }, { "reference_url": "https://github.com/vercel/next.js", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/vercel/next.js" }, { "reference_url": "https://github.com/vercel/next.js/commit/9c9aaed5bb9338ef31b0517ccf0ab4414f2093d8", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-02T17:26:15Z/" } ], "url": "https://github.com/vercel/next.js/commit/9c9aaed5bb9338ef31b0517ccf0ab4414f2093d8" }, { "reference_url": "https://github.com/vercel/next.js/security/advisories/GHSA-4342-x723-ch2f", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N" }, { "value": "MODERATE", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-02T17:26:15Z/" } ], "url": "https://github.com/vercel/next.js/security/advisories/GHSA-4342-x723-ch2f" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2025-57822", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-57822" }, { "reference_url": "https://vercel.com/changelog/cve-2025-57822", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-02T17:26:15Z/" } ], "url": "https://vercel.com/changelog/cve-2025-57822" }, { "reference_url": "https://github.com/advisories/GHSA-4342-x723-ch2f", "reference_id": "GHSA-4342-x723-ch2f", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" } ], "url": "https://github.com/advisories/GHSA-4342-x723-ch2f" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/69792?format=api", "purl": "pkg:npm/next@15.4.7", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1qzn-gxkv-wye3" }, { "vulnerability": "VCID-2tah-y5sg-hugp" }, { "vulnerability": "VCID-3m4d-v2y1-5ua4" }, { "vulnerability": "VCID-5kj1-stm6-8qgv" }, { "vulnerability": "VCID-pqwe-3ukm-dkh4" }, { "vulnerability": "VCID-qz2s-22e2-ufg9" }, { "vulnerability": "VCID-w35n-bwuy-5kce" }, { "vulnerability": "VCID-xv6q-hbf8-b7b1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:npm/next@15.4.7" } ], "aliases": [ "CVE-2025-57822", "GHSA-4342-x723-ch2f" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-54qu-9bx2-9ka8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/24378?format=api", "vulnerability_id": "VCID-5kj1-stm6-8qgv", "summary": "Next.js: HTTP request smuggling in rewrites\n## Summary\nWhen Next.js rewrites proxy traffic to an external backend, a crafted `DELETE`/`OPTIONS` request using `Transfer-Encoding: chunked` could trigger request boundary disagreement between the proxy and backend. This could allow request smuggling through rewritten routes.\n\n## Impact\nAn attacker could smuggle a second request to unintended backend routes (for example, internal/admin endpoints), bypassing assumptions that only the configured rewrite destination/path is reachable. This does not impact applications hosted on providers that handle rewrites at the CDN level, such as Vercel. \n\n## Patches\nThe vulnerability originated in an upstream library vendored by Next.js. It is fixed by updating that dependency’s behavior so `content-length: 0` is added only when both `content-length` and `transfer-encoding` are absent, and `transfer-encoding` is no longer removed in that code path.\n\n## Workarounds\nIf upgrade is not immediately possible:\n- Block chunked `DELETE`/`OPTIONS` requests on rewritten routes at your edge/proxy.\n- Enforce authentication/authorization on backend routes per our [security guidance](https://nextjs.org/docs/app/guides/data-security).", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-29057.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-29057.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-29057", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00029", "scoring_system": "epss", "scoring_elements": "0.08379", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00063", "scoring_system": "epss", "scoring_elements": "0.19764", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00063", "scoring_system": "epss", "scoring_elements": "0.19759", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00063", "scoring_system": "epss", "scoring_elements": "0.19708", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00063", "scoring_system": "epss", "scoring_elements": "0.19628", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.22369", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.22413", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00083", "scoring_system": "epss", "scoring_elements": "0.24321", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00083", "scoring_system": "epss", "scoring_elements": "0.24331", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00083", "scoring_system": "epss", "scoring_elements": "0.2437", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00083", "scoring_system": "epss", "scoring_elements": "0.24313", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-29057" }, { "reference_url": "https://github.com/vercel/next.js", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/vercel/next.js" }, { "reference_url": "https://github.com/vercel/next.js/commit/dc98c04f376c6a1df76ec3e0a2d07edf4abdabd6", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-18T14:47:14Z/" } ], "url": "https://github.com/vercel/next.js/commit/dc98c04f376c6a1df76ec3e0a2d07edf4abdabd6" }, { "reference_url": "https://github.com/vercel/next.js/releases/tag/v15.5.13", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-18T14:47:14Z/" } ], "url": "https://github.com/vercel/next.js/releases/tag/v15.5.13" }, { "reference_url": "https://github.com/vercel/next.js/releases/tag/v16.1.7", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-18T14:47:14Z/" } ], "url": "https://github.com/vercel/next.js/releases/tag/v16.1.7" }, { "reference_url": "https://github.com/vercel/next.js/security/advisories/GHSA-ggv3-7p47-pfv8", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" }, { "value": "6.3", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-18T14:47:14Z/" } ], "url": "https://github.com/vercel/next.js/security/advisories/GHSA-ggv3-7p47-pfv8" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2026-29057", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-29057" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2448515", "reference_id": "2448515", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2448515" }, { "reference_url": "https://github.com/advisories/GHSA-ggv3-7p47-pfv8", "reference_id": "GHSA-ggv3-7p47-pfv8", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" } ], "url": "https://github.com/advisories/GHSA-ggv3-7p47-pfv8" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/67554?format=api", "purl": "pkg:npm/next@15.5.13", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qz2s-22e2-ufg9" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:npm/next@15.5.13" }, { "url": "http://public2.vulnerablecode.io/api/packages/67076?format=api", "purl": "pkg:npm/next@16.1.7", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:npm/next@16.1.7" } ], "aliases": [ "CVE-2026-29057", "GHSA-ggv3-7p47-pfv8" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5kj1-stm6-8qgv" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/23703?format=api", "vulnerability_id": "VCID-pqwe-3ukm-dkh4", "summary": "Duplicate\nThis advisory duplicates another.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-55182.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "10.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-55182.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-55182", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.65077", "scoring_system": "epss", "scoring_elements": "0.98465", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.66271", "scoring_system": "epss", "scoring_elements": "0.98523", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.66271", "scoring_system": "epss", "scoring_elements": "0.98525", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.66271", "scoring_system": "epss", "scoring_elements": "0.9852", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.66271", "scoring_system": "epss", "scoring_elements": "0.98519", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.84483", "scoring_system": "epss", "scoring_elements": "0.99332", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.84891", "scoring_system": "epss", "scoring_elements": "0.99348", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.84891", "scoring_system": "epss", "scoring_elements": "0.99346", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.86904", "scoring_system": "epss", "scoring_elements": "0.99434", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-55182" }, { "reference_url": "https://github.com/facebook/react", "reference_id": "", "reference_type": "", "scores": [ { "value": "10.0", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" }, { "value": "CRITICAL", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/facebook/react" }, { "reference_url": "https://github.com/facebook/react/commit/7dc903cd29dac55efb4424853fd0442fef3a8700", "reference_id": "", "reference_type": "", "scores": [ { "value": "10.0", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" }, { "value": "CRITICAL", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/facebook/react/commit/7dc903cd29dac55efb4424853fd0442fef3a8700" }, { "reference_url": "https://github.com/facebook/react/pull/35277", "reference_id": "", "reference_type": "", "scores": [ { "value": "10.0", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" }, { "value": "CRITICAL", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/facebook/react/pull/35277" }, { "reference_url": "https://github.com/facebook/react/releases/tag/v19.0.1", "reference_id": "", "reference_type": "", "scores": [ { "value": "10.0", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" }, { "value": "CRITICAL", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/facebook/react/releases/tag/v19.0.1" }, { "reference_url": "https://github.com/facebook/react/releases/tag/v19.1.2", "reference_id": "", "reference_type": "", "scores": [ { "value": "10.0", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" }, { "value": "CRITICAL", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/facebook/react/releases/tag/v19.1.2" }, { "reference_url": "https://github.com/facebook/react/releases/tag/v19.2.1", "reference_id": "", "reference_type": "", "scores": [ { "value": "10.0", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" }, { "value": "CRITICAL", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/facebook/react/releases/tag/v19.2.1" }, { "reference_url": "https://github.com/vercel/next.js", "reference_id": "", "reference_type": "", "scores": [ { "value": "10.0", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" }, { "value": "CRITICAL", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/vercel/next.js" }, { "reference_url": "https://news.ycombinator.com/item?id=46136026", "reference_id": "", "reference_type": "", "scores": [ { "value": "10.0", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" }, { "value": "CRITICAL", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://news.ycombinator.com/item?id=46136026" }, { "reference_url": "https://react.dev/blog/2025/12/03/critical-security-vulnerability-in-react-server-components", "reference_id": "", "reference_type": "", "scores": [ { "value": "10", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" }, { "value": "10.0", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" }, { "value": "CRITICAL", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-12-06T04:55:43Z/" } ], "url": "https://react.dev/blog/2025/12/03/critical-security-vulnerability-in-react-server-components" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2025/12/03/4", "reference_id": "", "reference_type": "", "scores": [ { "value": "10.0", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" }, { "value": "CRITICAL", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://www.openwall.com/lists/oss-security/2025/12/03/4" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418613", "reference_id": "2418613", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418613" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/webapps/52506.py", "reference_id": "CVE-2025-55182", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/webapps/52506.py" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2025-55182", "reference_id": "CVE-2025-55182", "reference_type": "", "scores": [ { "value": "10.0", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" }, { "value": "CRITICAL", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-55182" }, { "reference_url": "https://www.facebook.com/security/advisories/cve-2025-55182", "reference_id": "CVE-2025-55182", "reference_type": "", "scores": [ { "value": "10", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" }, { "value": "10.0", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" }, { "value": "CRITICAL", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-12-06T04:55:43Z/" } ], "url": "https://www.facebook.com/security/advisories/cve-2025-55182" }, { "reference_url": "https://github.com/ejpir/CVE-2025-55182-poc", "reference_id": "CVE-2025-55182-POC", "reference_type": "", "scores": [ { "value": "10.0", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" }, { "value": "CRITICAL", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/ejpir/CVE-2025-55182-poc" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2025-66478", "reference_id": "CVE-2025-66478", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-66478" }, { "reference_url": "https://github.com/advisories/GHSA-9qr9-h5gf-34mp", "reference_id": "GHSA-9qr9-h5gf-34mp", "reference_type": "", "scores": [ { "value": "CRITICAL", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" } ], "url": "https://github.com/advisories/GHSA-9qr9-h5gf-34mp" }, { "reference_url": "https://github.com/vercel/next.js/security/advisories/GHSA-9qr9-h5gf-34mp", "reference_id": "GHSA-9qr9-h5gf-34mp", "reference_type": "", "scores": [ { "value": "10.0", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" }, { "value": "CRITICAL", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" }, { "value": "CRITICAL", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/vercel/next.js/security/advisories/GHSA-9qr9-h5gf-34mp" }, { "reference_url": "https://github.com/vitejs/vite-plugin-react/security/advisories/GHSA-fmh4-wr37-44fp", "reference_id": "GHSA-fmh4-wr37-44fp", "reference_type": "", "scores": [ { "value": "10.0", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" }, { "value": "CRITICAL", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/vitejs/vite-plugin-react/security/advisories/GHSA-fmh4-wr37-44fp" }, { "reference_url": "https://github.com/advisories/GHSA-fv66-9v8q-g76r", "reference_id": "GHSA-fv66-9v8q-g76r", "reference_type": "", "scores": [ { "value": "CRITICAL", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" } ], "url": "https://github.com/advisories/GHSA-fv66-9v8q-g76r" }, { "reference_url": "https://github.com/facebook/react/security/advisories/GHSA-fv66-9v8q-g76r", "reference_id": "GHSA-fv66-9v8q-g76r", "reference_type": "", "scores": [ { "value": "10.0", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" }, { "value": "CRITICAL", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" }, { "value": "CRITICAL", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/facebook/react/security/advisories/GHSA-fv66-9v8q-g76r" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/66678?format=api", "purl": "pkg:npm/next@15.4.8", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1qzn-gxkv-wye3" }, { "vulnerability": "VCID-2tah-y5sg-hugp" }, { "vulnerability": "VCID-3m4d-v2y1-5ua4" }, { "vulnerability": "VCID-5kj1-stm6-8qgv" }, { "vulnerability": "VCID-qz2s-22e2-ufg9" }, { "vulnerability": "VCID-w35n-bwuy-5kce" }, { "vulnerability": "VCID-xv6q-hbf8-b7b1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:npm/next@15.4.8" }, { "url": "http://public2.vulnerablecode.io/api/packages/66679?format=api", "purl": "pkg:npm/next@15.5.7", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1qzn-gxkv-wye3" }, { "vulnerability": "VCID-2tah-y5sg-hugp" }, { "vulnerability": "VCID-3m4d-v2y1-5ua4" }, { "vulnerability": "VCID-5kj1-stm6-8qgv" }, { "vulnerability": "VCID-qz2s-22e2-ufg9" }, { "vulnerability": "VCID-w35n-bwuy-5kce" }, { "vulnerability": "VCID-xv6q-hbf8-b7b1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:npm/next@15.5.7" }, { "url": "http://public2.vulnerablecode.io/api/packages/66919?format=api", "purl": "pkg:npm/next@15.6.0-canary.0", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1qzn-gxkv-wye3" }, { "vulnerability": "VCID-2tah-y5sg-hugp" }, { "vulnerability": "VCID-3m4d-v2y1-5ua4" }, { "vulnerability": "VCID-w35n-bwuy-5kce" }, { "vulnerability": "VCID-xv6q-hbf8-b7b1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:npm/next@15.6.0-canary.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/66680?format=api", "purl": "pkg:npm/next@16.0.7", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1qzn-gxkv-wye3" }, { "vulnerability": "VCID-2tah-y5sg-hugp" }, { "vulnerability": "VCID-3m4d-v2y1-5ua4" }, { "vulnerability": "VCID-5kj1-stm6-8qgv" }, { "vulnerability": "VCID-6rmp-13nt-2kb9" }, { "vulnerability": "VCID-7skv-ksvn-f7bu" }, { "vulnerability": "VCID-qz2s-22e2-ufg9" }, { "vulnerability": "VCID-w35n-bwuy-5kce" }, { "vulnerability": "VCID-wa6u-pkgn-cbaf" }, { "vulnerability": "VCID-xv6q-hbf8-b7b1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:npm/next@16.0.7" }, { "url": "http://public2.vulnerablecode.io/api/packages/66921?format=api", "purl": "pkg:npm/next@16.1.0-canary.0", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1qzn-gxkv-wye3" }, { "vulnerability": "VCID-2tah-y5sg-hugp" }, { "vulnerability": "VCID-3m4d-v2y1-5ua4" }, { "vulnerability": "VCID-5kj1-stm6-8qgv" }, { "vulnerability": "VCID-6rmp-13nt-2kb9" }, { "vulnerability": "VCID-7skv-ksvn-f7bu" }, { "vulnerability": "VCID-qz2s-22e2-ufg9" }, { "vulnerability": "VCID-w35n-bwuy-5kce" }, { "vulnerability": "VCID-wa6u-pkgn-cbaf" }, { "vulnerability": "VCID-xv6q-hbf8-b7b1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:npm/next@16.1.0-canary.0" } ], "aliases": [ "CVE-2025-55182", "CVE-2025-66478", "GHSA-9qr9-h5gf-34mp", "GHSA-fv66-9v8q-g76r" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pqwe-3ukm-dkh4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/24472?format=api", "vulnerability_id": "VCID-qz2s-22e2-ufg9", "summary": "Next.js: Unbounded next/image disk cache growth can exhaust storage\n## Summary\nThe default Next.js image optimization disk cache (`/_next/image`) did not have a configurable upper bound, allowing unbounded cache growth.\n\n## Impact\nAn attacker could generate many unique image-optimization variants and exhaust disk space, causing denial of service. Note that this does not impact platforms that have their own image optimization capabilities, such as Vercel.\n\n## Patches\nFixed by adding an LRU-backed disk cache with `images.maximumDiskCacheSize`, including eviction of least-recently-used entries when the limit is exceeded. Setting `maximumDiskCacheSize: 0` disables disk caching. \n\n## Workarounds\nIf upgrade is not immediately possible:\n- Periodically clean `.next/cache/images`.\n- Reduce variant cardinality (e.g., tighten values for `images.localPatterns`, `images.remotePatterns`, and `images.qualities`)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-27980.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-27980.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-27980", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.0444", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.04466", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05534", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05541", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05554", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05581", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05558", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.0552", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05495", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05484", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00022", "scoring_system": "epss", "scoring_elements": "0.06161", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-27980" }, { "reference_url": "https://github.com/vercel/next.js", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.9", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/vercel/next.js" }, { "reference_url": "https://github.com/vercel/next.js/commit/39eb8e0ac498b48855a0430fbf4c22276a73b4bd", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.9", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-18T19:50:06Z/" } ], "url": "https://github.com/vercel/next.js/commit/39eb8e0ac498b48855a0430fbf4c22276a73b4bd" }, { "reference_url": "https://github.com/vercel/next.js/releases/tag/v16.1.7", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.9", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-18T19:50:06Z/" } ], "url": "https://github.com/vercel/next.js/releases/tag/v16.1.7" }, { "reference_url": "https://github.com/vercel/next.js/security/advisories/GHSA-3x4c-7xq6-9pq8", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" }, { "value": "6.9", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-18T19:50:06Z/" } ], "url": "https://github.com/vercel/next.js/security/advisories/GHSA-3x4c-7xq6-9pq8" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27980", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.9", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27980" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2448509", "reference_id": "2448509", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2448509" }, { "reference_url": "https://github.com/advisories/GHSA-3x4c-7xq6-9pq8", "reference_id": "GHSA-3x4c-7xq6-9pq8", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" } ], "url": "https://github.com/advisories/GHSA-3x4c-7xq6-9pq8" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/67667?format=api", "purl": "pkg:npm/next@15.5.14", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:npm/next@15.5.14" }, { "url": "http://public2.vulnerablecode.io/api/packages/66919?format=api", "purl": "pkg:npm/next@15.6.0-canary.0", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1qzn-gxkv-wye3" }, { "vulnerability": "VCID-2tah-y5sg-hugp" }, { "vulnerability": "VCID-3m4d-v2y1-5ua4" }, { "vulnerability": "VCID-w35n-bwuy-5kce" }, { "vulnerability": "VCID-xv6q-hbf8-b7b1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:npm/next@15.6.0-canary.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/67076?format=api", "purl": "pkg:npm/next@16.1.7", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:npm/next@16.1.7" } ], "aliases": [ "CVE-2026-27980", "GHSA-3x4c-7xq6-9pq8" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qz2s-22e2-ufg9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/28519?format=api", "vulnerability_id": "VCID-r4pw-m8mz-xbdq", "summary": "Next.js Affected by Cache Key Confusion for Image Optimization API Routes\nA vulnerability in Next.js Image Optimization has been fixed in v15.4.5 and v14.2.31. When images returned from API routes vary based on request headers (such as `Cookie` or `Authorization`), these responses could be incorrectly cached and served to unauthorized users due to a cache key confusion bug.\n\nAll users are encouraged to upgrade if they use API routes to serve images that depend on request headers and have image optimization enabled.\n\nMore details at [Vercel Changelog](https://vercel.com/changelog/cve-2025-57752)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-57752.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.2", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-57752.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-57752", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00063", "scoring_system": "epss", "scoring_elements": "0.19434", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00063", "scoring_system": "epss", "scoring_elements": "0.19421", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00063", "scoring_system": "epss", "scoring_elements": "0.19413", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00063", "scoring_system": "epss", "scoring_elements": "0.19452", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00063", "scoring_system": "epss", "scoring_elements": "0.1951", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00063", "scoring_system": "epss", "scoring_elements": "0.19557", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00063", "scoring_system": "epss", "scoring_elements": "0.19554", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00063", "scoring_system": "epss", "scoring_elements": "0.19502", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00063", "scoring_system": "epss", "scoring_elements": "0.19423", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00063", "scoring_system": "epss", "scoring_elements": "0.19653", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00063", "scoring_system": "epss", "scoring_elements": "0.197", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-57752" }, { "reference_url": "https://github.com/vercel/next.js", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/vercel/next.js" }, { "reference_url": "https://github.com/vercel/next.js/commit/6b12c60c61ee80cb0443ccd20de82ca9b4422ddd", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-02T19:23:30Z/" } ], "url": "https://github.com/vercel/next.js/commit/6b12c60c61ee80cb0443ccd20de82ca9b4422ddd" }, { "reference_url": "https://github.com/vercel/next.js/pull/82114", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-02T19:23:30Z/" } ], "url": "https://github.com/vercel/next.js/pull/82114" }, { "reference_url": "https://github.com/vercel/next.js/security/advisories/GHSA-g5qg-72qw-gw5v", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" }, { "value": "MODERATE", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-02T19:23:30Z/" } ], "url": "https://github.com/vercel/next.js/security/advisories/GHSA-g5qg-72qw-gw5v" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2025-57752", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-57752" }, { "reference_url": "https://vercel.com/changelog/cve-2025-57752", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-02T19:23:30Z/" } ], "url": "https://vercel.com/changelog/cve-2025-57752" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2392060", "reference_id": "2392060", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2392060" }, { "reference_url": "https://github.com/advisories/GHSA-g5qg-72qw-gw5v", "reference_id": "GHSA-g5qg-72qw-gw5v", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" } ], "url": "https://github.com/advisories/GHSA-g5qg-72qw-gw5v" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/69873?format=api", "purl": "pkg:npm/next@15.4.5", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1qzn-gxkv-wye3" }, { "vulnerability": "VCID-2tah-y5sg-hugp" }, { "vulnerability": "VCID-3m4d-v2y1-5ua4" }, { "vulnerability": "VCID-54qu-9bx2-9ka8" }, { "vulnerability": "VCID-5kj1-stm6-8qgv" }, { "vulnerability": "VCID-pqwe-3ukm-dkh4" }, { "vulnerability": "VCID-qz2s-22e2-ufg9" }, { "vulnerability": "VCID-w35n-bwuy-5kce" }, { "vulnerability": "VCID-xv6q-hbf8-b7b1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:npm/next@15.4.5" } ], "aliases": [ "CVE-2025-57752", "GHSA-g5qg-72qw-gw5v" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-r4pw-m8mz-xbdq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/28594?format=api", "vulnerability_id": "VCID-sjdx-v2z6-3fcw", "summary": "Next.js Content Injection Vulnerability for Image Optimization\nA vulnerability in **Next.js Image Optimization** has been fixed in **v15.4.5** and **v14.2.31**. The issue allowed attacker-controlled external image sources to trigger file downloads with arbitrary content and filenames under specific configurations. This behavior could be abused for phishing or malicious file delivery.\n\nAll users relying on `images.domains` or `images.remotePatterns` are encouraged to upgrade and verify that external image sources are strictly validated.\n\nMore details at [Vercel Changelog](https://vercel.com/changelog/cve-2025-55173)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-55173.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-55173.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-55173", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00197", "scoring_system": "epss", "scoring_elements": "0.41577", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00197", "scoring_system": "epss", "scoring_elements": "0.41652", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00197", "scoring_system": "epss", "scoring_elements": "0.41678", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00197", "scoring_system": "epss", "scoring_elements": "0.41631", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00197", "scoring_system": "epss", "scoring_elements": "0.41677", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00197", "scoring_system": "epss", "scoring_elements": "0.41654", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00197", "scoring_system": "epss", "scoring_elements": "0.41645", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00197", "scoring_system": "epss", "scoring_elements": "0.41595", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00197", "scoring_system": "epss", "scoring_elements": "0.41668", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00206", "scoring_system": "epss", "scoring_elements": "0.42968", "published_at": "2026-04-02T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-55173" }, { "reference_url": "https://github.com/vercel/next.js", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/vercel/next.js" }, { "reference_url": "https://github.com/vercel/next.js/commit/6b12c60c61ee80cb0443ccd20de82ca9b4422ddd", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-02T19:22:48Z/" } ], "url": "https://github.com/vercel/next.js/commit/6b12c60c61ee80cb0443ccd20de82ca9b4422ddd" }, { "reference_url": "https://github.com/vercel/next.js/security/advisories/GHSA-xv57-4mr9-wg8v", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" }, { "value": "MODERATE", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-02T19:22:48Z/" } ], "url": "https://github.com/vercel/next.js/security/advisories/GHSA-xv57-4mr9-wg8v" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2025-55173", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-55173" }, { "reference_url": "https://vercel.com/changelog/cve-2025-55173", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-02T19:22:48Z/" } ], "url": "https://vercel.com/changelog/cve-2025-55173" }, { "reference_url": "http://vercel.com/changelog/cve-2025-55173", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://vercel.com/changelog/cve-2025-55173" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2392059", "reference_id": "2392059", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2392059" }, { "reference_url": "https://github.com/advisories/GHSA-xv57-4mr9-wg8v", "reference_id": "GHSA-xv57-4mr9-wg8v", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" } ], "url": "https://github.com/advisories/GHSA-xv57-4mr9-wg8v" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/69873?format=api", "purl": "pkg:npm/next@15.4.5", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1qzn-gxkv-wye3" }, { "vulnerability": "VCID-2tah-y5sg-hugp" }, { "vulnerability": "VCID-3m4d-v2y1-5ua4" }, { "vulnerability": "VCID-54qu-9bx2-9ka8" }, { "vulnerability": "VCID-5kj1-stm6-8qgv" }, { "vulnerability": "VCID-pqwe-3ukm-dkh4" }, { "vulnerability": "VCID-qz2s-22e2-ufg9" }, { "vulnerability": "VCID-w35n-bwuy-5kce" }, { "vulnerability": "VCID-xv6q-hbf8-b7b1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:npm/next@15.4.5" } ], "aliases": [ "CVE-2025-55173", "GHSA-xv57-4mr9-wg8v" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-sjdx-v2z6-3fcw" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/20177?format=api", "vulnerability_id": "VCID-w35n-bwuy-5kce", "summary": "Next.js HTTP request deserialization can lead to DoS when using insecure React Server Components\nA vulnerability affects certain React Server Components packages for versions 19.0.x, 19.1.x, and 19.2.x and frameworks that use the affected packages, including Next.js 13.x, 14.x, 15.x, and 16.x using the App Router. The issue is tracked upstream as [CVE-2026-23864](https://github.com/facebook/react/security/advisories/GHSA-83fc-fqcc-2hmg).\n\nA specially crafted HTTP request can be sent to any App Router Server Function endpoint that, when deserialized, may trigger excessive CPU usage, out-of-memory exceptions, or server crashes. This can result in denial of service in unpatched environments.", "references": [ { "reference_url": "https://github.com/facebook/react/security/advisories/GHSA-83fc-fqcc-2hmg", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/facebook/react/security/advisories/GHSA-83fc-fqcc-2hmg" }, { "reference_url": "https://github.com/vercel/next.js", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/vercel/next.js" }, { "reference_url": "https://github.com/vercel/next.js/security/advisories/GHSA-h25m-26qc-wcjf", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/vercel/next.js/security/advisories/GHSA-h25m-26qc-wcjf" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2026-23864", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-23864" }, { "reference_url": "https://vercel.com/changelog/summary-of-cve-2026-23864", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://vercel.com/changelog/summary-of-cve-2026-23864" }, { "reference_url": "https://github.com/advisories/GHSA-h25m-26qc-wcjf", "reference_id": "GHSA-h25m-26qc-wcjf", "reference_type": "", "scores": [ { "value": "HIGH", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" } ], "url": "https://github.com/advisories/GHSA-h25m-26qc-wcjf" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/61642?format=api", "purl": "pkg:npm/next@15.4.11", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3m4d-v2y1-5ua4" }, { "vulnerability": "VCID-5kj1-stm6-8qgv" }, { "vulnerability": "VCID-qz2s-22e2-ufg9" }, { "vulnerability": "VCID-xv6q-hbf8-b7b1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:npm/next@15.4.11" }, { "url": "http://public2.vulnerablecode.io/api/packages/61643?format=api", "purl": "pkg:npm/next@15.5.10", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3m4d-v2y1-5ua4" }, { "vulnerability": "VCID-5kj1-stm6-8qgv" }, { "vulnerability": "VCID-qz2s-22e2-ufg9" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:npm/next@15.5.10" }, { "url": "http://public2.vulnerablecode.io/api/packages/61644?format=api", "purl": "pkg:npm/next@15.6.0-canary.61", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-xv6q-hbf8-b7b1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:npm/next@15.6.0-canary.61" }, { "url": "http://public2.vulnerablecode.io/api/packages/61645?format=api", "purl": "pkg:npm/next@16.0.11", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3m4d-v2y1-5ua4" }, { "vulnerability": "VCID-5kj1-stm6-8qgv" }, { "vulnerability": "VCID-6rmp-13nt-2kb9" }, { "vulnerability": "VCID-7skv-ksvn-f7bu" }, { "vulnerability": "VCID-qz2s-22e2-ufg9" }, { "vulnerability": "VCID-wa6u-pkgn-cbaf" }, { "vulnerability": "VCID-xv6q-hbf8-b7b1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:npm/next@16.0.11" }, { "url": "http://public2.vulnerablecode.io/api/packages/61646?format=api", "purl": "pkg:npm/next@16.1.5", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5kj1-stm6-8qgv" }, { "vulnerability": "VCID-6rmp-13nt-2kb9" }, { "vulnerability": "VCID-7skv-ksvn-f7bu" }, { "vulnerability": "VCID-qz2s-22e2-ufg9" }, { "vulnerability": "VCID-wa6u-pkgn-cbaf" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:npm/next@16.1.5" } ], "aliases": [ "GHSA-h25m-26qc-wcjf" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-w35n-bwuy-5kce" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/20657?format=api", "vulnerability_id": "VCID-xv6q-hbf8-b7b1", "summary": "Next.js self-hosted applications vulnerable to DoS via Image Optimizer remotePatterns configuration\nA DoS vulnerability exists in self-hosted Next.js applications that have `remotePatterns` configured for the Image Optimizer. The image optimization endpoint (`/_next/image`) loads external images entirely into memory without enforcing a maximum size limit, allowing an attacker to cause out-of-memory conditions by requesting optimization of arbitrarily large images. This vulnerability requires that `remotePatterns` is configured to allow image optimization from external domains and that the attacker can serve or control a large image on an allowed domain.\n\nStrongly consider upgrading to 15.5.10 and 16.1.5 to reduce risk and prevent availability issues in Next applications.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-59471.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-59471.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-59471", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07214", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07769", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07692", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07661", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07721", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07739", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07738", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07724", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07708", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07633", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07621", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-59471" }, { "reference_url": "https://github.com/vercel/next.js", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/vercel/next.js" }, { "reference_url": "https://github.com/vercel/next.js/commit/500ec83743639addceaede95e95913398975156c", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/vercel/next.js/commit/500ec83743639addceaede95e95913398975156c" }, { "reference_url": "https://github.com/vercel/next.js/commit/e5b834d208fe0edf64aa26b5d76dcf6a176500ec", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/vercel/next.js/commit/e5b834d208fe0edf64aa26b5d76dcf6a176500ec" }, { "reference_url": "https://github.com/vercel/next.js/releases/tag/v15.5.10", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/vercel/next.js/releases/tag/v15.5.10" }, { "reference_url": "https://github.com/vercel/next.js/releases/tag/v16.1.5", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/vercel/next.js/releases/tag/v16.1.5" }, { "reference_url": "https://github.com/vercel/next.js/security/advisories/GHSA-9g9p-9gw9-jx7f", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "MODERATE", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-27T14:54:47Z/" } ], "url": "https://github.com/vercel/next.js/security/advisories/GHSA-9g9p-9gw9-jx7f" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2025-59471", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-59471" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2433094", "reference_id": "2433094", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2433094" }, { "reference_url": "https://github.com/advisories/GHSA-9g9p-9gw9-jx7f", "reference_id": "GHSA-9g9p-9gw9-jx7f", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" } ], "url": "https://github.com/advisories/GHSA-9g9p-9gw9-jx7f" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/61643?format=api", "purl": "pkg:npm/next@15.5.10", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3m4d-v2y1-5ua4" }, { "vulnerability": "VCID-5kj1-stm6-8qgv" }, { "vulnerability": "VCID-qz2s-22e2-ufg9" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:npm/next@15.5.10" }, { "url": "http://public2.vulnerablecode.io/api/packages/61646?format=api", "purl": "pkg:npm/next@16.1.5", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5kj1-stm6-8qgv" }, { "vulnerability": "VCID-6rmp-13nt-2kb9" }, { "vulnerability": "VCID-7skv-ksvn-f7bu" }, { "vulnerability": "VCID-qz2s-22e2-ufg9" }, { "vulnerability": "VCID-wa6u-pkgn-cbaf" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:npm/next@16.1.5" } ], "aliases": [ "CVE-2025-59471", "GHSA-9g9p-9gw9-jx7f" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xv6q-hbf8-b7b1" } ], "fixing_vulnerabilities": [], "risk_score": "10.0", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:npm/next@15.4.0-canary.58" }