CVE-2025-29927

Published Mar 21, 2025

Last updated 9 days ago

CVSS critical 9.1
React
Next.js

Overview

AI description

Generated using AI and has not been reviewed by Intruder. May contain errors.

CVE-2025-29927 is an authorization bypass vulnerability affecting Next.js, a React framework. It stems from the improper handling of the `x-middleware-subrequest` header. By exploiting this vulnerability, attackers can bypass authorization checks implemented in Next.js middleware. This flaw allows attackers to skip running the middleware, potentially allowing requests to bypass critical checks like authorization cookie validation before reaching routes. Self-hosted Next.js applications using Middleware are affected, specifically those relying on it for authentication or security checks. The vulnerability is fixed in Next.js versions 14.2.25 and 15.2.3.

Description
Next.js is a React framework for building full-stack web applications. Starting in version 1.11.4 and prior to versions 12.3.5, 13.5.9, 14.2.25, and 15.2.3, it is possible to bypass authorization checks within a Next.js application, if the authorization check occurs in middleware. If patching to a safe version is infeasible, it is recommend that you prevent external user requests which contain the x-middleware-subrequest header from reaching your Next.js application. This vulnerability is fixed in 12.3.5, 13.5.9, 14.2.25, and 15.2.3.
Source
security-advisories@github.com
NVD status
Awaiting Analysis

Insights

Analysis from the Intruder Security Team
Published Mar 24, 2025 Updated Mar 24, 2025

This authentication bypass vulnerability in Next.js allows an attacker to bypass middleware validation steps such as checking the user is authorized to access a resource. The exploit is simple to use and could potentially be exploited en-masse, though some manual effort is likely to be required to identify routes that are not accessible without authentication.

The advisory states that deployments using next start and output: 'standalone' should be updated as a priority, and lists the affected versions.

Next.js is a full stack framework, and applications which are only using front-end elements of the framework will not be vulnerable. Additionally, popular WAFs like Cloudflare added detection rules for this exploit already, so there is also reduced risk for applications which are deployed behind a WAF with effective rules. However, WAFs should not be relied upon to protect against this weakness, as further research could reveal bypasses, or alternative routes to exploit the weakness.

Risk scores

CVSS 3.1

Type
Secondary
Base score
9.1
Impact score
5.2
Exploitability score
3.9
Vector string
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
Severity
CRITICAL

Weaknesses

security-advisories@github.com
CWE-285

Social media

Hype score
Not currently trending
  1. A critical vulnerability (CVE-2025-29927) in the Next.js framework that could expose sensitive data has been discovered. Read advise from the NCSC: https://t.co/QG1cDJkLHb Check out the NCSC advisory and take action to secure your apps. #CyberSecurity #NextJS #WebDevelopment

    @DigitalXRAID

    15 Apr 2025

    10 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  2. 🚨ثغرة #CVE-2025-29927 لتجاوز مصادقة Next.js Middleware! ☑️الخطر: الوصول غير المصرح به إلى الموارد المحمية ☑️الإصدارات المهددة: 14.2.25 ومادون ☑️بحث https://t.co/gKKiwWrA0u ب : "X Powered By: Next.js" ☑️الحل: تحديث الإصدار و #ASM https://t.co/OAmmhkjFrj https://t.co/rQTTMorqJV

    @CriminalIP_AR

    15 Apr 2025

    19 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  3. 🚨Next.js 미들웨어 인증 우회 취약점 #CVE-2025-29927! ☑️영향: 보호된 리소스에 비인가 접근 ☑️취약 버전: 14.2.25 미만 ☑️수정 버전: 12.3.5, 13.5.9, 14.2.25, 15.2.3 ☑️https://t.co/ZdemHmQb5V 탐지 쿼리: "X Powered By: Next.js" ☑️조치: 버전 업데이트 & #ASM Blog: https://t.co/NcJ1dmn6PR https://t.co/SgpUNJ7hwq

    @CriminalIP_KR

    15 Apr 2025

    79 Impressions

    0 Retweets

    1 Like

    0 Bookmarks

    0 Replies

    0 Quotes

  4. Next.js Middlewareの認証バイパス脆弱性「#CVE-2025-29927」 ☑️影響:保護されたリソースへの不正アクセス ☑️脆弱版:14.2.25未満 ☑️修正版:12.3.5、13.5.9、14.2.25、15.2.3 ☑️https://t.co/IVizkfqat2 のクエリ:"X Powered By: Next.js" ☑️対策:バージョンアップ & #ASM https://t.co/nOMNodXyZC https://t.co/pXo7WPGgEc

    @CriminalIP_JP

    15 Apr 2025

    30 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  5. HackerNotes TLDR for episode 118! Link for the post with all references below. ►⠀Next.js Middleware Bypass (CVE-2025-29927): The Searchlight Cyber (AssetNote) team has done another deep dive on the Next.JS middleware bypass, giving us some extra payloads to play around with.

    @ctbbpodcast

    14 Apr 2025

    2309 Impressions

    3 Retweets

    43 Likes

    17 Bookmarks

    0 Replies

    0 Quotes

  6. Read about observed attack traffic, detections, and mitigations for an authorization bypass vulnerability in Next.js (CVE-2025-29927). Learn more. @Akamai #AkamaiSecurity https://t.co/4SGK2EGtg4 https://t.co/zPEmNMGoNt

    @Yanivzadok

    13 Apr 2025

    21 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  7. 🚨 New Arena Lab Dropped! Middleman (CVE-2025-29927) is now live on Parrot CTFs! 💥 Learn how to exploit a middleware authentication bypass in Next.js and gain access to protected routes. 🔓 Easy difficulty – perfect for sharpening your web exploitation skills! 🏆 Earn 10 https

    @parrot_ctfs

    11 Apr 2025

    110 Impressions

    2 Retweets

    8 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  8. NextJS Vulnerability Alert: CVE-2025-29927 A new auth bypass bug has hit Next.js — are your apps safe? 🔐 Dive into the full breakdown: 🔗 https://t.co/c3CkACGdjb #ParrotCTFs https://t.co/iJ0iQYmGfp

    @parrot_ctfs

    10 Apr 2025

    82 Impressions

    2 Retweets

    3 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  9. 🚨 Next.js CVE-2025-29927 Exploit May Threaten Web3 dApps 🔴 How might the attack work? Attackers can exploit the CVE-2025-29927 vulnerability in Next.js to bypass authentication in web applications, including Web3 dApps, by forging the x-middleware-subrequest header. This https

    @cometix_ai

    9 Apr 2025

    124 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  10. 🚨 Next.js CVE-2025-29927 Exploit May Threaten Web3 dApps 🔴 How might the attack work? Attackers can exploit the CVE-2025-29927 vulnerability in Next.js to bypass authentication in web applications, including Web3 dApps, by forging the x-middleware-subrequest header. This https

    @cometix_ai

    9 Apr 2025

    20 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  11. #ThreatProtection #CVE-2025-29927 - Next.js middleware #vulnerability, read more about Symantec's protection: https://t.co/gmmvONPKas

    @threatintel

    9 Apr 2025

    59 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  12. A critical vulnerability in Next.js middleware, CVE-2025-29927, allows authentication bypass, exposing over 520K assets; users are urged to update to version 14.1.0-canary.35 or later to mitigate risks. #NextJS #CyberSecurity https://t.co/ItjCdR16X4

    @Cyber_O51NT

    9 Apr 2025

    6 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  13. Next.js Middleware Bypass Vulnerability CVE-2025-29927 https://t.co/9m72dQGEcW 🧵 https://t.co/6frReWA2xy

    @keraattin

    8 Apr 2025

    42 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  14. Read about observed attack traffic, detections, and mitigations for an authorization bypass vulnerability in Next.js (CVE-2025-29927). Learn more. @Akamai #AkamaiSecurity https://t.co/4xkzph74BL https://t.co/lb1VWilwL7

    @epichol

    7 Apr 2025

    10 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  15. Actively exploited CVE : CVE-2025-29927

    @transilienceai

    6 Apr 2025

    36 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  16. 🌀 This is wild! ⚡ You’ve probably seen Next.js middleware auth bypass (CVE-2025-29927) — but there’s another similar vulnerability: CVE-2024-51479 POC: curl "https://t.co/WC2hLrIlnB" -i fixed: Next.js v14.2.15 For more read: https://t.co/7EaQRFIfJa #Nextjs #bugbountytips #CVE

    @darkshadow2bd

    6 Apr 2025

    240 Impressions

    0 Retweets

    0 Likes

    1 Bookmark

    0 Replies

    0 Quotes

  17. Actively exploited CVE : CVE-2025-29927

    @transilienceai

    6 Apr 2025

    20 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  18. Actively exploited CVE : CVE-2025-29927

    @transilienceai

    5 Apr 2025

    22 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  19. Actively exploited CVE : CVE-2025-29927

    @transilienceai

    4 Apr 2025

    20 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  20. Next.js alert: a critical middleware bypass (CVE-2025-29927) could put your app at risk. Update your version to secure your site. #CodeNewbie https://t.co/qDetrKavqd

    @CodeNewbies

    4 Apr 2025

    553 Impressions

    0 Retweets

    2 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  21. CVE-2025-29927: this is a vulnerability associated with Nextjs it allows attackers to bypass middleware..to check whether your next application is affected,run this command on an Linux cmd: nuclei -u <your website url> -t http/cves/2025/CVE-2025-29927.yaml -vv

    @prakash_dev11

    4 Apr 2025

    41 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  22. Actively exploited CVE : CVE-2025-29927

    @transilienceai

    4 Apr 2025

    15 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  23. Actively exploited CVE : CVE-2025-29927

    @transilienceai

    3 Apr 2025

    19 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  24. Next.js had a serious middleware bypass bug (CVE-2025-29927). Attackers could skip auth and other logic just by spoofing a header. Broke it down simply, what happened, how it was fixed, and what to do now: https://t.co/bVhDybLmvH #Nextjs #webdev #infosec

    @Jagadhis02

    3 Apr 2025

    6 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  25. 🚨 Next.js Alert (CVE-2025-29927) 🚨 Risk: Middleware bypass allows unauthorized access. Affected: 12.x <12.3.5, 13.x <13.5.9, 14.x <14.2.25, 15.x <15.2.3. Fix: Update, secure middleware, check logs. Patch now! 🚀 #Nextjs #CyberSecurity #SecurityUpdate #DevCommunity h

    @HafizAliAhmed9

    3 Apr 2025

    42 Impressions

    0 Retweets

    2 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  26. I recently reported a vulnerability to Next.js, which is a partial bypass of the middleware authentication bypass vulnerability (CVE-2025-29927) with Takumi (https://t.co/vV7HCbs9Dr), an AI security engineer.

    @ryotkak

    3 Apr 2025

    4251 Impressions

    12 Retweets

    81 Likes

    21 Bookmarks

    1 Reply

    0 Quotes

  27. Actively exploited CVE : CVE-2025-29927

    @transilienceai

    2 Apr 2025

    31 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  28. Actively exploited CVE : CVE-2025-29927

    @transilienceai

    2 Apr 2025

    20 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  29. Plop, HExHTTP v1.8: - New cve module to check Next.js CPDoS by @zhero___ research (CVE-2025-29927) - New module to check cache poisoning via path traversal (Thanks @0xRTH !) - Proxy features (-p option) https://t.co/rKm7WZzeBS HF !

    @c0dejump

    2 Apr 2025

    211 Impressions

    0 Retweets

    11 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  30. Actively exploited CVE : CVE-2025-29927

    @transilienceai

    2 Apr 2025

    27 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  31. NextJs security update: CVE-2025-29927 https://t.co/geegiCsN1c

    @HaamedBahram

    1 Apr 2025

    11651 Impressions

    0 Retweets

    6 Likes

    1 Bookmark

    0 Replies

    0 Quotes

  32. Actively exploited CVE : CVE-2025-29927

    @transilienceai

    1 Apr 2025

    22 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  33. I Scanned 100,000+ Subdomains For CVE-2025-29927 https://t.co/jsGw3AjA8t @NahamSec

    @tbbhunter

    1 Apr 2025

    1615 Impressions

    0 Retweets

    19 Likes

    4 Bookmarks

    0 Replies

    0 Quotes

  34. Uncovered a critical vulnerability (CVE-2025-29927) affecting countless apps after scanning 100,000+ subdomains. Even major companies with hefty security budgets remain exposed. 🔍💻 #VulnerabilityScan #SubFinder #USA link: https://t.co/vqvUz90GTU https://t.co/Uer73iiF32

    @TweetThreatNews

    31 Mar 2025

    72 Impressions

    1 Retweet

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  35. Authorisation bypass vulnerability in Next.js web development framework (CVE-2025-29927) #AuthorizationBypassVulnerability #CVE202529927 #nextjs https://t.co/BMehYmuns4 https://t.co/KyuvLc6PvO

    @SystemTek_UK

    31 Mar 2025

    30 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  36. 🛠️ NextSploit: Scanner & Exploiter. ℹ️ La herramienta primero identifica si un sitio web objetivo está ejecutando Next.js y determina si su versión se encuentra dentro del rango vulnerable. #CVE-2025-29927 https://t.co/83YCgIYfiH

    @tpx_Security

    31 Mar 2025

    85 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  37. I Scanned 100,000+ Subdomains For CVE-2025-29927 https://t.co/cOZaqSu4uT https://t.co/tchsnjjiww

    @NahamSec

    31 Mar 2025

    11799 Impressions

    45 Retweets

    365 Likes

    138 Bookmarks

    3 Replies

    0 Quotes

  38. Act now to address CVE-2025-29927 in Next.js framework. Stay secure: https://t.co/sl9foLQPeR

    @threatlight

    31 Mar 2025

    10 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  39. 株式会社ユービーセキュアは、当社が提供する脆弱性検査ツール「Vex」および「VexCloud」において、2025年3月31日Next.jsに関する重大な脆弱性(CVE-2025-29927)に対応する検査パターンを追加し、緊急リリースを実施いたしました。 詳しくはこちら https://t.co/tZFtNSYIub

    @BekkuSumire

    31 Mar 2025

    3 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  40. How detect CVE-2025-29927, analyze your application's reliance on middleware-based authorization and test for unauthorized access by manipulating the x-middleware-subrequest header.​ https://t.co/Vaz3cy764O #nextjs #detection

    @kriwarefeed

    31 Mar 2025

    10 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  41. Developers, don't ignore this - Next.js CVE-2025-29927 CVE-2025-29927 allowed attackers to bypass Middleware checks—including authorization validation—by manipulating the x-middleware-subrequest header. #NextJS #Security #WebDev #js #CyberSecurity #infosec #CVE https://t.co/

    @defhawk_specter

    31 Mar 2025

    67 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  42. 🛡Research Paper 📖Next.js and the corrupt middleware: the authorizing artifact CVE-2025-29927 AUTH BYPASS 🔥https://t.co/2G074sp0m2 https://t.co/hgFFTpQuIb

    @darkshadow2bd

    31 Mar 2025

    30 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  43. Actively exploited CVE : CVE-2025-29927

    @transilienceai

    31 Mar 2025

    17 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  44. 「Next.js」脆弱性の概念実証が公開 - 脆弱なサーバを探索する動きも https://t.co/6SuwTB3h4d ウェブアプリケーションフレームワーク「Next.js」に脆弱性「CVE-2025-29927」が明らかになった問題で、すでに悪用を試みるアクセスが観測されている。

    @neichin_rina

    30 Mar 2025

    4 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  45. Actively exploited CVE : CVE-2025-29927

    @transilienceai

    30 Mar 2025

    21 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  46. Read about observed attack traffic, detections, and mitigations for an authorization bypass vulnerability in Next.js (CVE-2025-29927). Learn more. @Akamai #AkamaiSecurity https://t.co/Ye8GM6HRDq https://t.co/tpdcelyPP8

    @ArminBolenius

    30 Mar 2025

    14 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  47. 🚨 Next.js just dropped version 15.2.3 to patch a critical security vulnerability (CVE-2025-29927). If you’re self-hosting, update ASAP! Security first, folks! 🔒 #NextJS #DevCommunity https://t.co/CrwtUSHLg4

    @bobde_yagyesh

    30 Mar 2025

    15 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  48. 👀 6-year-old bugs are back and being weaponized. CISA just flagged two 2019 Sitecore RCE flaws (CVE-2019-9874 & 9875) as actively exploited. But it doesn’t stop there: ➡️ Next.js auth bypass (CVE-2025-29927) is under live attack ➡️ DrayTek routers face fresh waves targetin

    @achi_tech

    29 Mar 2025

    47 Impressions

    0 Retweets

    0 Likes

    1 Bookmark

    0 Replies

    0 Quotes

  49. #threatreport #LowCompleteness Understanding CVE-2025-29927: The Next.js middleware authorization bypass vulnerability | 29-03-2025 Source: https://t.co/OKKioaFDhw Key details below ↓ 🔓CVEs: CVE-2025-29927 \[[Vulners](https://t.co/CMgpKFo6fy)] - CVSS V3.1: *9.1*, - https://

    @rst_cloud

    29 Mar 2025

    31 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  50. Next.js Middleware Vulnerability CVE-2025-29927 Next.js is one of the most widely used modern JavaScript frameworks, constantly evolving with patches to address known vulnerabilities. Recently,... https://t.co/IPgJFoWDHN

    @cyberalertnepal

    29 Mar 2025

    26 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes