Next.js is a React framework for building full-stack web applications. Starting in version 1.11.4 and prior to versions 12.3.5, 13.5.9, 14.2.25, and 15.2.3, it is possible to bypass authorization checks within a Next.js application, if the authorization check occurs in middleware. If patching to a safe version is infeasible, it is recommend that you prevent external user requests which contain the x-middleware-subrequest header from reaching your Next.js application. This vulnerability is fixed in 12.3.5, 13.5.9, 14.2.25, and 15.2.3.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 16 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.93638}

epss

{'score': 0.93721}


Tue, 08 Apr 2025 14:15:00 +0000

Type Values Removed Values Added
Description Next.js is a React framework for building full-stack web applications. Prior to 14.2.25 and 15.2.3, it is possible to bypass authorization checks within a Next.js application, if the authorization check occurs in middleware. If patching to a safe version is infeasible, it is recommend that you prevent external user requests which contain the x-middleware-subrequest header from reaching your Next.js application. This vulnerability is fixed in 14.2.25 and 15.2.3. Next.js is a React framework for building full-stack web applications. Starting in version 1.11.4 and prior to versions 12.3.5, 13.5.9, 14.2.25, and 15.2.3, it is possible to bypass authorization checks within a Next.js application, if the authorization check occurs in middleware. If patching to a safe version is infeasible, it is recommend that you prevent external user requests which contain the x-middleware-subrequest header from reaching your Next.js application. This vulnerability is fixed in 12.3.5, 13.5.9, 14.2.25, and 15.2.3.
References

Fri, 28 Mar 2025 15:45:00 +0000

Type Values Removed Values Added
References

Wed, 26 Mar 2025 03:15:00 +0000

Type Values Removed Values Added
References

Tue, 25 Mar 2025 02:00:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

threat_severity

Critical


Sun, 23 Mar 2025 22:45:00 +0000


Fri, 21 Mar 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 21 Mar 2025 14:45:00 +0000

Type Values Removed Values Added
Description Next.js is a React framework for building full-stack web applications. Prior to 14.2.25 and 15.2.3, it is possible to bypass authorization checks within a Next.js application, if the authorization check occurs in middleware. If patching to a safe version is infeasible, it is recommend that you prevent external user requests which contain the x-middleware-subrequest header from reaching your Next.js application. This vulnerability is fixed in 14.2.25 and 15.2.3.
Title Authorization Bypass in Next.js Middleware
Weaknesses CWE-285
References
Metrics cvssV3_1

{'score': 9.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2025-04-08T15:17:05.315Z

Reserved: 2025-03-12T13:42:22.136Z

Link: CVE-2025-29927

cve-icon Vulnrichment

Updated: 2025-03-28T15:03:09.597Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-03-21T15:15:42.660

Modified: 2025-04-08T14:15:33.973

Link: CVE-2025-29927

cve-icon Redhat

Severity : Critical

Publid Date: 2025-03-21T14:34:49Z

Links: CVE-2025-29927 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2025-07-12T15:26:09Z