- Notifications
You must be signed in to change notification settings - Fork30.1k
Authorization Bypass in Next.js Middleware
Critical
Unknown publishedGHSA-f82v-jwr5-mffwMar 21, 2025
Package
next (npm)
Affected versions
=> 11.1.4 < 12.3.5
=>14.0 <14.2.25
=>15.0 <15.2.3
>= 13.0.0, < 13.5.9
Patched versions
12.3.5
14.2.25
15.2.3
13.5.9
Description
Impact
It is possible to bypass authorization checks within a Next.js application, if the authorization check occurs in middleware.
Patches
- For Next.js 15.x, this issue is fixed in
15.2.3 - For Next.js 14.x, this issue is fixed in
14.2.25 - For Next.js 13.x, this issue is fixed in 13.5.9
- For Next.js 12.x, this issue is fixed in 12.3.5
- For Next.js 11.x, consult the below workaround.
Note: Next.js deployments hosted on Vercel are automatically protected against this vulnerability.
Workaround
If patching to a safe version is infeasible, we recommend that you prevent external user requests which contain thex-middleware-subrequest header from reaching your Next.js application.
Credits
- Allam Rachid (zhero;)
- Allam Yasser (inzo_)
Severity
Critical / 10
CVSS v3 base metrics
Attack vector
Network
Attack complexity
Low
Privileges required
None
User interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
None
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
CVE ID
CVE-2025-29927
Weaknesses
WeaknessCWE-285
Improper Authorization
The product does not perform or incorrectly performs an authorization check when an actor attempts to access a resource or perform an action.Learn more on MITRE.Credits
cold-tryReporter