Strongly consider upgrading to 15.5.10 or 16.1.5 to reduce risk and prevent availability issues in Next applications.
No analysis available yet.
No remediation available yet.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-9g9p-9gw9-jx7f | Next.js self-hosted applications vulnerable to DoS via Image Optimizer remotePatterns configuration |
Fri, 13 Feb 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:vercel:next.js:*:*:*:*:*:node.js:*:* |
Thu, 29 Jan 2026 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | next: NextJS Denial of Service in Image Optimizer | |
| Weaknesses | CWE-770 | |
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Tue, 27 Jan 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-400 | |
| Metrics |
ssvc
|
Tue, 27 Jan 2026 09:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Vercel
Vercel next.js |
|
| Vendors & Products |
Vercel
Vercel next.js |
Mon, 26 Jan 2026 22:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A denial of service vulnerability exists in self-hosted Next.js applications that have `remotePatterns` configured for the Image Optimizer. The image optimization endpoint (`/_next/image`) loads external images entirely into memory without enforcing a maximum size limit, allowing an attacker to cause out-of-memory conditions by requesting optimization of arbitrarily large images. This vulnerability requires that `remotePatterns` is configured to allow image optimization from external domains and that the attacker can serve or control a large image on an allowed domain. Strongly consider upgrading to 15.5.10 or 16.1.5 to reduce risk and prevent availability issues in Next applications. | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: hackerone
Published:
Updated: 2026-01-27T14:55:15.271Z
Reserved: 2025-09-16T15:00:07.876Z
Link: CVE-2025-59471
Updated: 2026-01-27T14:55:07.103Z
Status : Analyzed
Published: 2026-01-26T22:15:52.890
Modified: 2026-02-13T15:03:20.290
Link: CVE-2025-59471
OpenCVE Enrichment
Updated: 2026-01-27T09:03:08Z
Github GHSA