Home

Description

Next.js is a React framework for building full-stack web applications. Prior to versions 14.2.32 and 15.4.7, when next() was used without explicitly passing the request object, it could lead to SSRF in self-hosted applications that incorrectly forwarded user-supplied headers. This vulnerability has been fixed in Next.js versions 14.2.32 and 15.4.7. All users implementing custom middleware logic in self-hosted environments are strongly encouraged to upgrade and verify correct usage of the next() function.

PUBLISHED Reserved 2025-08-20 | Published 2025-08-29 | Updated 2025-09-02 | Assigner GitHub_M




MEDIUM: 6.5CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N

Problem types

CWE-918: Server-Side Request Forgery (SSRF)

Product status

< 14.2.32
affected

< 15.4.7
affected

References

github.com/...ext.js/security/advisories/GHSA-4342-x723-ch2f

github.com/...ommit/9c9aaed5bb9338ef31b0517ccf0ab4414f2093d8

vercel.com/changelog/cve-2025-57822

cve.org (CVE-2025-57822)

nvd.nist.gov (CVE-2025-57822)

Download JSON