First published: Fri Jan 28 2022(Updated: )
### Impact Vulnerable code could allow a bad actor to trigger a denial of service attack for anyone running a Next.js app at version >= 12.0.0, and using i18n functionality. - **Affected:** All of the following must be true to be affected by this CVE - Next.js versions above v12.0.0 - Using next start or a custom server - Using the built-in i18n support - **Not affected:** - Deployments on Vercel (vercel.com) are not affected along with similar environments where invalid requests are filtered before reaching Next.js. ### Patches A patch has been released, `next@12.0.9`, that mitigates this issue. We recommend all affected users upgrade as soon as possible. ### Workarounds We recommend upgrading whether you can reproduce or not although you can ensure `/${locale}/_next/` is blocked from reaching the Next.js instance until you upgrade. ### For more information If you have any questions or comments about this advisory: * Open an issue in [next](https://github.com/vercel/next.js) * Email us at [security@vercel.com](mailto:security@vercel.com)
Credit: security-advisories@github.com security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
npm/next | >=12.0.0<12.0.9 | 12.0.9 |
Vercel Next.js | >=12.0.0<12.0.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-21721 is a vulnerability in Next.js framework prior to version 12.0.9 that could allow a denial of service attack for users using i18n functionality.
A bad actor can exploit CVE-2022-21721 by triggering a denial of service attack on Next.js applications that use i18n functionality.
CVE-2022-21721 has a severity score of 7.5 (high).
To fix CVE-2022-21721, upgrade Next.js to version 12.0.9 or later.
You can find more information about CVE-2022-21721 on the GitHub security advisory page: https://github.com/vercel/next.js/security/advisories/GHSA-wr66-vrwm-5g5x