Impact
A crafted DELETE or OPTIONS request that uses Transfer-Encoding: chunked can cause a request boundary disagreement between a Next.js rewrite proxy and its intended backend. This discrepancy allows an attacker to smuggle a second HTTP request into an unintended backend route, potentially reaching internal or administrative endpoints that the application assumes are protected. The vulnerability is classified as HTTP Request Smuggling (CWE-444) and can undermine the confidentiality, integrity, and availability of the backend when misconfigured rewrite paths are used.
Affected Systems
The affected product is vercel:next.js. Any installation from version 9.5.0 up through before 15.5.13 and 16.1.7 is vulnerable. Applications hosted on providers that perform rewrites at the CDN edge, such as Vercel’s own hosting, are not impacted because the rewrite is handled outside the vulnerable component.
Risk and Exploitability
The CVSS score is 6.3, indicating a moderate severity, while the EPSS score is less than 1%, suggesting low current exploitation activity. The vulnerability is not listed in the CISA KEV catalog. Exploitation requires an attacker to send a specially crafted DELETE/OPTIONS request with a chunked transfer encoding to a rewritten route. The exploitation path is limited to environments where the Next.js rewriting functionality is enabled and does not rely on external CDN rewrites.
OpenCVE Enrichment
Github GHSA