We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-49826

Next.js DoS vulnerability via cache poisoning



Description

Next.js is a React framework for building full-stack web applications. From versions 15.0.4-canary.51 to before 15.1.8, a cache poisoning bug leading to a Denial of Service (DoS) condition was found in Next.js. This issue does not impact customers hosted on Vercel. Under certain conditions, this issue may allow a HTTP 204 response to be cached for static pages, leading to the 204 response being served to all users attempting to access the page. This issue has been addressed in version 15.1.8.

Reserved 2025-06-11 | Published 2025-07-03 | Updated 2025-07-03 | Assigner GitHub_M


HIGH: 7.5CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Problem types

CWE-444: Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')

Product status

>= 15.0.4-canary.51, < 15.1.8
affected

References

github.com/...ext.js/security/advisories/GHSA-67rr-84xm-4c7r

github.com/...ommit/a15b974ed707d63ad4da5b74c1441f5b7b120e93

github.com/vercel/next.js/releases/tag/v15.1.8

vercel.com/changelog/cve-2025-49826

cve.org (CVE-2025-49826)

nvd.nist.gov (CVE-2025-49826)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-49826

Support options

Helpdesk Chat, Email, Knowledgebase