Home

Description

Next.js is a React framework for building full-stack web applications. From versions 15.0.4-canary.51 to before 15.1.8, a cache poisoning bug leading to a Denial of Service (DoS) condition was found in Next.js. This issue does not impact customers hosted on Vercel. Under certain conditions, this issue may allow a HTTP 204 response to be cached for static pages, leading to the 204 response being served to all users attempting to access the page. This issue has been addressed in version 15.1.8.

PUBLISHED Reserved 2025-06-11 | Published 2025-07-03 | Updated 2025-07-08 | Assigner GitHub_M




HIGH: 7.5CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Problem types

CWE-444: Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')

Product status

>= 15.0.4-canary.51, < 15.1.8
affected

References

github.com/...ext.js/security/advisories/GHSA-67rr-84xm-4c7r

github.com/...ommit/a15b974ed707d63ad4da5b74c1441f5b7b120e93

github.com/vercel/next.js/releases/tag/v15.1.8

vercel.com/changelog/cve-2025-49826

cve.org (CVE-2025-49826)

nvd.nist.gov (CVE-2025-49826)

Download JSON