Executive Summary

Informations
Name CVE-2025-29927 First vendor Publication 2025-03-21
Vendor Cve Last vendor Modification 2025-04-08

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores

Detail

Next.js is a React framework for building full-stack web applications. Starting in version 1.11.4 and prior to versions 12.3.5, 13.5.9, 14.2.25, and 15.2.3, it is possible to bypass authorization checks within a Next.js application, if the authorization check occurs in middleware. If patching to a safe version is infeasible, it is recommend that you prevent external user requests which contain the x-middleware-subrequest header from reaching your Next.js application. This vulnerability is fixed in 12.3.5, 13.5.9, 14.2.25, and 15.2.3.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-29927

Sources (Detail)

http://www.openwall.com/lists/oss-security/2025/03/23/3
http://www.openwall.com/lists/oss-security/2025/03/23/4
https://github.com/vercel/next.js/commit/52a078da3884efe6501613c7834a3d02a916...
https://github.com/vercel/next.js/commit/5fd3ae8f8542677c6294f32d18022731eab6...
https://github.com/vercel/next.js/releases/tag/v12.3.5
https://github.com/vercel/next.js/releases/tag/v13.5.9
https://github.com/vercel/next.js/security/advisories/GHSA-f82v-jwr5-mffw
https://security.netapp.com/advisory/ntap-20250328-0002/
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
2
3
Date Informations
2025-05-27 02:56:23
  • Multiple Updates
2025-03-28 17:20:44
  • Multiple Updates
2025-03-24 05:20:34
  • Multiple Updates
2025-03-21 17:20:32
  • First insertion