#cve202529927

2025-03-26

[Перевод] Как 9.3 уязвимость ждала открытия 3 года

В крупнейшем JavaScript фреймворке, Next.js, была найдена критическая уязвимость 9.3/10, на исправление которой Vercel потребовалось 13 дней .

habr.com/ru/articles/894770/

#javascript #vercel #nextjs #cve #cve202529927 #github

Suzanne Aldrich (she/her)suzannealdrich@hachyderm.io
2025-03-23

Critical Next.js Middleware Vulnerability (CVE-2025-29927)

A major auth bypass vulnerability in Next.js middleware (prior to v14.2.25 / v15.2.3) allows attackers to inject the x-middleware-subrequest header and bypass authorization entirely. Exploitable via simple HTTP requests—no user interaction, no special permissions.

Patch. Now. Or block the header manually.

GitHub scored this 9.1 CRITICAL, but the real issue? This flaw exposes a systemic weakness in middleware validation, and some vendors weren’t exactly upfront about the risks.

Details + POC: zeropath.com/blog/nextjs-middl
NVD: nvd.nist.gov/vuln/detail/CVE-2

Security theater is easy. Secure defaults and transparency are harder—but essential.

#infosec #AppSec #NextJS #CVE202529927 #middleware #securityfail

N-gated Hacker Newsngate
2025-03-22

🔥 Oh no! The Earth-shattering CVE-2025-29927 has been unleashed, bringing the Next.js universe to its knees...or so they say. 🎭 Apparently, to save humanity, you must update ASAP—because nothing screams urgency like a numbering system that sounds like a barcode. 🥳
nextjs.org/blog/cve-2025-29927

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst