First published: Wed Aug 11 2021(Updated: )
Next.js is an open source website development framework to be used with the React library. In affected versions specially encoded paths could be used when pages/_error.js was statically generated allowing an open redirect to occur to an external site. In general, this redirect does not directly harm users although can allow for phishing attacks by redirecting to an attacker's domain from a trusted domain. We recommend everyone to upgrade regardless of whether you can reproduce the issue or not. The issue has been patched in release 11.1.0.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Vercel Next.js | >=10.0.5<=10.2.0 | |
Vercel Next.js | >=11.0.0<=11.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
Next.js is an open source website development framework to be used with the React library.
The vulnerability ID for Next.js is CVE-2021-37699.
The severity of CVE-2021-37699 is medium with a CVSS score of 6.1.
In affected versions of Next.js, specially encoded paths could be used to cause an open redirect to an external site when pages/_error.js was statically generated.
To fix CVE-2021-37699 in Next.js, update to version 11.1.0 or newer. Refer to the Next.js security advisory for more details.