Next.js is a React framework for building full-stack web applications. In versions before 14.2.31 and from 15.0.0 to before 15.4.5, Next.js Image Optimization is vulnerable to content injection. The issue allowed attacker-controlled external image sources to trigger file downloads with arbitrary content and filenames under specific configurations. This behavior could be abused for phishing or malicious file delivery. This vulnerability has been fixed in Next.js versions 14.2.31 and 15.4.5.
History

Tue, 02 Sep 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 01 Sep 2025 12:15:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

threat_severity

Moderate


Sun, 31 Aug 2025 08:45:00 +0000

Type Values Removed Values Added
First Time appeared Vercel
Vercel next.js
Vendors & Products Vercel
Vercel next.js

Fri, 29 Aug 2025 22:15:00 +0000

Type Values Removed Values Added
Description Next.js is a React framework for building full-stack web applications. In versions before 14.2.31 and from 15.0.0 to before 15.4.5, Next.js Image Optimization is vulnerable to content injection. The issue allowed attacker-controlled external image sources to trigger file downloads with arbitrary content and filenames under specific configurations. This behavior could be abused for phishing or malicious file delivery. This vulnerability has been fixed in Next.js versions 14.2.31 and 15.4.5.
Title Next.js Content Injection Vulnerability for Image Optimization
Weaknesses CWE-20
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2025-09-02T19:22:57.504Z

Reserved: 2025-08-07T18:27:23.309Z

Link: CVE-2025-55173

cve-icon Vulnrichment

Updated: 2025-09-02T19:22:53.153Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-08-29T22:15:31.750

Modified: 2025-09-02T15:55:35.520

Link: CVE-2025-55173

cve-icon Redhat

Severity : Moderate

Publid Date: 2025-08-29T22:00:05Z

Links: CVE-2025-55173 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2025-08-31T08:41:34Z