HomeVercelCVE-2025-29927

CVE-2025-29927

CRITICAL
9.1CVSS
Published: 2025-03-21
Updated: 2025-09-10
AI Analysis

Description

Next.js is a React framework for building full-stack web applications. Starting in version 1.11.4 and prior to versions 12.3.5, 13.5.9, 14.2.25, and 15.2.3, it is possible to bypass authorization checks within a Next.js application, if the authorization check occurs in middleware. If patching to a safe version is infeasible, it is recommend that you prevent external user requests which contain the x-middleware-subrequest header from reaching your Next.js application. This vulnerability is fixed in 12.3.5, 13.5.9, 14.2.25, and 15.2.3.

CVSS Metrics

Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
Attack Vector
network
Complexity
low
Privileges
none
User Action
none
Scope
unchanged
Confidentiality
high
Integrity
high
Availability
none
Weaknesses
CWE-285CWE-863

Metadata

Primary Vendor
VERCEL
Published
3/21/2025
Last Modified
9/10/2025
Source
NIST NVD
Note: Verify all details with official vendor sources before applying patches.

Affected Products

vercel : next.jsvercel : next.jsvercel : next.jsvercel : next.js

AI-Powered Remediation

Generate remediation guidance or a C-suite brief for this vulnerability.

Executive Intelligence Brief

CVE-CVE-2025-29927 | CRITICAL Severity | CVEDatabase.com | CVEDatabase.com