Impact
Next.js versions 10.0.0 through 16.1.6 have an unbounded image optimization disk cache by default. The cache grows without a configurable upper bound, allowing many unique image‑optimization variants to consume all available disk space. This results in denial of service to users when the application can no longer write cache entries. The flaw is characterized as Uncontrolled Resource Consumption (CWE‑400) and Use of Too Large Buffer (CWE‑770).
Affected Systems
The vulnerability affects the Vercel Next.js framework with default image optimization settings. All releases from version 10.0.0 up to, but not including, version 16.1.7 are susceptible. The default cache path is /_next/image and the related .next/cache/images directory is subject to uncontrolled growth.
Risk and Exploitability
The CVSS base score of 6.9 indicates medium severity, while the EPSS score of less than 1% reflects a low probability of exploitation in the wild. The issue is not listed in the CISA KEV catalog. An attacker can exploit the flaw by repeatedly requesting image variants that trigger cache writes, causing disk exhaustion. The primary attack vector is automated HTTP requests to the image optimization endpoint; no special privileges or authentication are required.
OpenCVE Enrichment
Github GHSA