First published: Fri Mar 21 2025(Updated: )
# Impact It is possible to bypass authorization checks within a Next.js application, if the authorization check occurs in middleware. # Patches * For Next.js 15.x, this issue is fixed in `15.2.3` * For Next.js 14.x, this issue is fixed in `14.2.25` * For Next.js 13.x, this issue is fixed in `13.5.9` * For Next.js 12.x, this issue is fixed in `12.3.5` * For Next.js 11.x, consult the below workaround. _Note: Next.js deployments hosted on Vercel are automatically protected against this vulnerability._ # Workaround If patching to a safe version is infeasible, it is recommend that you prevent external user requests which contain the `x-middleware-subrequest` header from reaching your Next.js application. ## Credits - Allam Rachid (zhero;) - Allam Yasser (inzo_)
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Vercel | <14.2.25<15.2.3 | |
npm/next | >=11.1.4<12.3.5 | 12.3.5 |
npm/next | >=15.0.0<15.2.3 | 15.2.3 |
npm/next | >=14.0.0<14.2.25 | 14.2.25 |
npm/next | >=13.0.0<13.5.9 | 13.5.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-29927 has been classified as a high severity vulnerability due to the potential for unauthorized access in Next.js applications.
To fix CVE-2025-29927, update to Next.js version 14.2.25 or 15.2.3 or later.
CVE-2025-29927 affects Next.js versions prior to 14.2.25 and 15.2.3.
CVE-2025-29927 allows attackers to bypass authorization checks in Next.js applications when these checks are performed in middleware.
If updating is not possible, implementing additional server-side checks for authorization in app logic can serve as a temporary workaround for CVE-2025-29927.