Critical Next.js Vulnerability Allows Attackers to Bypass Middleware Authorization Checks
Next.js框架被发现存在严重安全漏洞(CVE-2025-29927),CVSS评分9.1分。该漏洞可被利用绕过授权检查,访问受限资源如管理员页面。已发布补丁版本(12.3.5、13.5.9等),建议升级或阻止含特定头的请求以缓解风险。 2025-3-24 09:17:0 Author: thehackernews.com(查看原文) 阅读量:3 收藏

Vulnerability / Web Security

A critical security flaw has been disclosed in the Next.js React framework that could be potentially exploited to bypass authorization checks under certain conditions.

The vulnerability, tracked as CVE-2025-29927, carries a CVSS score of 9.1 out of 10.0.

"Next.js uses an internal header x-middleware-subrequest to prevent recursive requests from triggering infinite loops," Next.js said in an advisory.

"It was possible to skip running middleware, which could allow requests to skip critical checks—such as authorization cookie validation—before reaching routes."

The shortcoming has been addressed in versions 12.3.5, 13.5.9, 14.2.25, and 15.2.3. If patching is not an option, it's recommended that users prevent external user requests that contain the x-middleware-subrequest header from reaching the Next.js application.

Cybersecurity

Security researcher Rachid Allam (aka zhero and cold-try), who is credited with discovering and reporting the flaw, has since published additional technical details of the flaw, making it imperative that users move quickly to apply the fixes.

"The vulnerability allows attackers to easily bypass authorization checks performed in Next.js middleware, potentially allowing attackers access to sensitive web pages reserved for admins or other high-privileged users," JFrog said.

The company also said any host website that utilizes middleware to authorize users without any additional authorization checks is vulnerable to CVE-2025-29927, potentially enabling attackers to access otherwise unauthorized resources (e.g., admin pages).

Found this article interesting? Follow us on Twitter and LinkedIn to read more exclusive content we post.


文章来源: https://thehackernews.com/2025/03/critical-nextjs-vulnerability-allows.html
如有侵权请联系:admin#unsafe.sh