CVE-2025-29927

Published Mar 21, 2025

Last updated 5 months ago

CVSS critical 9.1
React
Next.js

Overview

AI description

Automated description summarized from trusted sources.

CVE-2025-29927 is an authorization bypass vulnerability affecting Next.js, a React framework. It stems from the improper handling of the `x-middleware-subrequest` header. By exploiting this vulnerability, attackers can bypass authorization checks implemented in Next.js middleware. This flaw allows attackers to skip running the middleware, potentially allowing requests to bypass critical checks like authorization cookie validation before reaching routes. Self-hosted Next.js applications using Middleware are affected, specifically those relying on it for authentication or security checks. The vulnerability is fixed in Next.js versions 14.2.25 and 15.2.3.

Description
Next.js is a React framework for building full-stack web applications. Starting in version 1.11.4 and prior to versions 12.3.5, 13.5.9, 14.2.25, and 15.2.3, it is possible to bypass authorization checks within a Next.js application, if the authorization check occurs in middleware. If patching to a safe version is infeasible, it is recommend that you prevent external user requests which contain the x-middleware-subrequest header from reaching your Next.js application. This vulnerability is fixed in 12.3.5, 13.5.9, 14.2.25, and 15.2.3.
Source
security-advisories@github.com
NVD status
Analyzed
Products
next.js

Insights

Analysis from the Intruder Security Team
Published Mar 24, 2025 Updated Mar 24, 2025

This authentication bypass vulnerability in Next.js allows an attacker to bypass middleware validation steps such as checking the user is authorized to access a resource. The exploit is simple to use and could potentially be exploited en-masse, though some manual effort is likely to be required to identify routes that are not accessible without authentication.

The advisory states that deployments using next start and output: 'standalone' should be updated as a priority, and lists the affected versions.

Next.js is a full stack framework, and applications which are only using front-end elements of the framework will not be vulnerable. Additionally, popular WAFs like Cloudflare added detection rules for this exploit already, so there is also reduced risk for applications which are deployed behind a WAF with effective rules. However, WAFs should not be relied upon to protect against this weakness, as further research could reveal bypasses, or alternative routes to exploit the weakness.

Risk scores

CVSS 3.1

Type
Secondary
Base score
9.1
Impact score
5.2
Exploitability score
3.9
Vector string
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
Severity
CRITICAL

Weaknesses

security-advisories@github.com
CWE-285
nvd@nist.gov
CWE-863

Social media

Hype score
Not currently trending
  1. 🚨 Next.js Middleware Auth Bypass (CVE-2025-29927 | CVSS 9.1) One trusted header. Skipped middleware. Full app compromise. Our research shows how a single request leads to auth bypass, LFI & server takeover. Full blog: https://t.co/s20LKcdmiF Connect - https://t.co/wRAYxGeO

    @consult_secnuo

    28 Jan 2026

    31 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  2. CVE-2025-29927: Next.js Middleware Bypass: When 'I'm With The Band' Actually Works https://t.co/YkiB6BgVG9 #security #cybersecurity #cve #ghsa

    @_cvereports

    12 Jan 2026

    12 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  3. Top 5 Trending CVEs: 1 - CVE-2025-43533 2 - CVE-2023-29218 3 - CVE-2026-20029 4 - CVE-2025-55182 5 - CVE-2025-29927 #cve #cvetrends #cveshield #cybersecurity https://t.co/4Fua3CAN6W

    @CVEShield

    11 Jan 2026

    75 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  4. HackTheBox - Previous ⚙️ Authorization Bypass en Next.js (CVE-2025-29927) 📂 Descarga de archivos via Path Traversal 🔑 Credenciales para SSH 🚀 Privesc con sudo y Terraform https://t.co/qmQvcGDXzd

    @sckull_

    10 Jan 2026

    54 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  5. Previous from @hackthebox_eu features CVE-2025-29927 (NextJS middleware auth bypass), directory traversal for file read, and three ways to abuse a Terraform sudo rule with !env_reset to get root. https://t.co/8wz1Fnbz38

    @0xdf_

    10 Jan 2026

    1974 Impressions

    5 Retweets

    32 Likes

    8 Bookmarks

    1 Reply

    0 Quotes

  6. Best of 2025: CVE-2025-29927 – Understanding the Next.js Middleware Vulnerability - Security Boulevard https://t.co/7C55OcSEEd

    @PVynckier

    4 Jan 2026

    116 Impressions

    1 Retweet

    1 Like

    0 Bookmarks

    0 Replies

    0 Quotes

  7. Day 79 of #100DaysOfCybersecurity🛡️ Next.js CVE-2025-29927 lab completed ✅ Analyzed an authorization bypass where a crafted HTTP header skips middleware checks and exposes protected routes ⚠️ Affects Next.js versions before 14.2.25 and 15.2.3. Patch now. https://t.

    @HezyChacha

    31 Dec 2025

    23 Impressions

    0 Retweets

    1 Like

    0 Bookmarks

    0 Replies

    0 Quotes

  8. I just completed Next.js: CVE-2025-29927 room on TryHackMe. Explore an authorisation bypass vulnerability in Next.js. https://t.co/VQjqTYrVDA #tryhackme via @tryhackme

    @HezyChacha

    31 Dec 2025

    36 Impressions

    0 Retweets

    1 Like

    0 Bookmarks

    0 Replies

    0 Quotes

  9. به تازگی گروه هکری با نام PCPcat از دو آسیب پذیری با کد های شناسایی CVE-2025-29927 و CVE-2025-66478 برای نفوذ به سرورها استفاده می کنند. یکی از این آسیب پذیری ها مربوط به آسی

    @AmirHossein_sec

    25 Dec 2025

    57 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  10. Operation PCPcat Hacked 59,000+ Next.js/React Servers Within 48 Hours A massive credential-theft campaign dubbed PCPcat compromised 59,128 Next.js servers in under 48 hours. The operation exploits critical vulnerabilities CVE-2025-29927 and CVE-2025-66478, achieving a 64.6%

    @redhuvivek09

    25 Dec 2025

    161 Impressions

    0 Retweets

    3 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  11. 🚨 Operation PCPcat: Credential-Stealing Campaign Hijacks 59,000+ Next.js Servers via React/Next.js RCE A mass exploitation campaign is compromising internet-facing Next.js deployments by chaining CVE-2025-29927 and CVE-2025-66478 for RCE, then scraping high-value secrets (.env

    @ThreatSynop

    25 Dec 2025

    3 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  12. 🚨 Operation PCPcat Hacked 59,000+ Next.js/React Servers Within 48 Hours Source: https://t.co/O09ua70IX0 A massive credential-theft campaign dubbed PCPcat compromised 59,128 Next.js servers in under 48 hours. The operation exploits critical vulnerabilities CVE-2025-29927 and

    @The_Cyber_News

    24 Dec 2025

    4808 Impressions

    34 Retweets

    95 Likes

    28 Bookmarks

    3 Replies

    1 Quote

  13. 59,128台のNext.jsサーバが48時間でハッキングされた。Beelzebub社報告。CVE-2025-29927とCVE-2025-66478の連鎖。攻撃成功率は64.6%。C2サーバ偵察による調査。活動をOperation PCPcatと命名。 https://t.co/FIwX4EOrYX

    @__kokumoto

    24 Dec 2025

    3471 Impressions

    14 Retweets

    46 Likes

    16 Bookmarks

    0 Replies

    1 Quote

  14. PCPcat malware compromises 59,000+ servers in under 48 hours via React2Shell exploit, abusing .js/React RCE flaws CVE-2025-29927 and CVE-2025-66478 for unauthenticated remote code execution. #Malware https://t.co/3iSPlAiBTl

    @threatcluster

    15 Dec 2025

    33 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  15. I just completed Next.js: CVE-2025-29927 room on TryHackMe. Explore an authorisation bypass vulnerability in Next.js. https://t.co/FxrOM7K1yV #tryhackme via @tryhackme

    @mXgarweg

    13 Dec 2025

    35 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  16. ⚠️ SCASH Wallet 安全通报 & 服务状态更新 经过紧急维护,我们的网页钱包现已恢复正常。 区块链浏览器将会在24小时内恢复。 这次问题源自 Next.js 的一个已公开漏洞(CVE-2025-29927)。该漏洞允许攻击者通过构

    @Hysanalde

    8 Dec 2025

    1267 Impressions

    7 Retweets

    23 Likes

    2 Bookmarks

    5 Replies

    0 Quotes

  17. 🚨 Even popular frameworks like Next.js can have serious flaws… Just completed the Next.js: CVE-2025-29927 room on @TryHackMe 🧠💻 Dug into an authorization bypass vulnerability and how attackers can exploit weak access control. 🔗 https://t.co/7npcdvpCc5 #TryHackMe

    @BlackLightning5

    24 Nov 2025

    10 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  18. CVE-2025-29927 https://t.co/fmtDlTNkXc

    @ExWareLabs

    19 Nov 2025

    46 Impressions

    0 Retweets

    1 Like

    0 Bookmarks

    0 Replies

    0 Quotes

  19. Want to learn a way to find those hard-hitting critical vulnerabilities? 🐛 CVE-2025-29927 is a vulnerability in Next.JS that can lead to a complete authorization bypass. Watch the video below to get a quick peek and then try the lab yourself 👇 https://t.co/zC6GAAqOB0… h

    @Kimcheater_

    16 Nov 2025

    41 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  20. Next.jsのMiddlewareで認証している方はすぐに確認を!認可バイパス脆弱性(CVE-2025-29927)の解説と対策 https://t.co/IrxQiIPHiR #Qiita

    @keigoriankami

    10 Nov 2025

    18 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  21. CVE-2025-29927 - #Next.js Auth Bypass PoC https://t.co/AJsKE1EMUA #hacking

    @hack4lifemx

    6 Nov 2025

    101 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  22. Want to learn a way to find those hard-hitting critical vulnerabilities? 🐛 CVE-2025-29927 is a vulnerability in Next.JS that can lead to a complete authorization bypass. Watch the video below to get a quick peek and then try the lab yourself 👇 https://t.co/U8HN812Oey http

    @hackinghub_io

    5 Nov 2025

    6422 Impressions

    23 Retweets

    122 Likes

    91 Bookmarks

    1 Reply

    0 Quotes

  23. Post 1/30 : CVE-2025-29927 How to find Vulnerable Assets for it! Steps; 1. Get all domains and IPS Domains >> Subfinder -dL list-of-domain.txt -o subdomains.txt IPs >> shodan search "ssl:'domain.tld'" --fields ip_str --limit 1000 >> ips.txt 2. find their op

    @h4x0r_fr34k

    19 Oct 2025

    11773 Impressions

    31 Retweets

    249 Likes

    272 Bookmarks

    1 Reply

    1 Quote

  24. Day 1/30 : CVE-2025-29927 How to find Vulnerable Assets for it! Steps; 1. Get all domains and IPS Domains >> Subfinder -dL list-of-domain.txt -o subdomains.txt IPs >> shodan search "ssl:'domain.tld'" --fields ip_str --limit 1000 >> ips.txt 2. find their ope

    @h4x0r_fr34k

    19 Oct 2025

    31 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  25. I was awarded a $290 bounty on @Hacker0x01! https://t.co/5dbKBrWp1S #TogetherWeHitHarder #bugbountytips Tip: CVE-2025-29927 via /admin https://t.co/sERtc8B1ks

    @exploit_msf

    4 Oct 2025

    3254 Impressions

    2 Retweets

    127 Likes

    15 Bookmarks

    2 Replies

    0 Quotes

  26. 🚨 ¡Nuevo vídeo disponible! Explotando el CVE-2025-29927 en un middleware vulnerable 💥 Desde la detección hasta la PoC funcional. ✅ Identificar versión vulnerable ✅ Conectar Burp y analizar 🎯 Pensamiento ofensivo aplicado. No teoría. 📺 https://t.co/Noy9UEmX

    @gorkaelbochi

    20 Sept 2025

    74 Impressions

    0 Retweets

    0 Likes

    1 Bookmark

    0 Replies

    0 Quotes

  27. 🚨CVE-2025-29927: Next.js Middleware Bypass Vulnerability PoC: https://t.co/olD5JesWY1 Credit: https://t.co/3XCm1VLLsI https://t.co/nIJFC7hjf4

    @DarkWebInformer

    17 Sept 2025

    7723 Impressions

    19 Retweets

    97 Likes

    52 Bookmarks

    0 Replies

    1 Quote

  28. 🚨 ¡Nuevo vídeo ya disponible! 📽️ Explotando el CVE-2025-29927 paso a paso 🧠 Middleware vulnerable → PoC funcional → ejecución real ✅ Detectar versión vulnerable ✅ Analizar el flujo ✅ Construir PoC ✅ Explotación práctica 📺 https://t.co/Noy9UEmXIo

    @gorkaelbochi

    16 Sept 2025

    81 Impressions

    0 Retweets

    1 Like

    0 Bookmarks

    0 Replies

    0 Quotes

  29. 💡 ⚒️ ✏️  Ghost-Route - Ghost Route Detects If A Next JS Site Is Vulnerable To The Corrupt Middleware Bypass Bug (CVE-2025-29927) https://t.co/cDC5TeXhMw

    @pedri77

    15 Sept 2025

    46 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  30. 🚨 Este martes 16 a las 20:00 subo vídeo: Explotación paso a paso del CVE-2025-29927 🧠 ¿El objetivo? Un middleware vulnerable. Verás: ✅ Qué es middleware ✅ Cómo detectar la versión vulnerable ✅ Cómo explotarlo (real) 💥 Sin teoría. Todo práctico. 💞 ht

    @gorkaelbochi

    15 Sept 2025

    52 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  31. I just completed Next.js: CVE-2025-29927 room on TryHackMe. Explore an authorisation bypass vulnerability in Next.js. https://t.co/3sLnz8REQ3 #tryhackme via @realtryhackme

    @vinnykosgeii

    13 Sept 2025

    62 Impressions

    0 Retweets

    1 Like

    0 Bookmarks

    0 Replies

    0 Quotes

  32. 🚨 Next.js CVE-2025-29927 – Authentication Bypass Explained 🔎 What Happened? A critical vulnerability in Next.js middleware (CVE-2025-29927, CVSS 9.1) allows attackers to bypass authentication and authorization checks. The root cause: improper trust of an internal header

    @AnonOzzyDude

    8 Sept 2025

    55 Impressions

    0 Retweets

    1 Like

    0 Bookmarks

    0 Replies

    0 Quotes

  33. 🚨 Unmasking #CVE-2025-29927: The Nextjs Framework Flaw Every Hunter Must Understand https://t.co/ReHVZzwlgw Educational Purposes!

    @UndercodeUpdate

    7 Sept 2025

    40 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  34. Next.jsフレームワークに新たに発見された重大な脆弱性CVE-2025-29927は、 認可機構を完全に回避できる恐れがあり、Webアプリケーションに深刻な影響を及ぼす可能性がある。 問題はx-middleware-subrequestヘッダの不適

    @yousukezan

    1 Sept 2025

    1947 Impressions

    6 Retweets

    15 Likes

    7 Bookmarks

    0 Replies

    0 Quotes

  35. VIDEO POC CVE-2025-29927 https://t.co/hyIIbdPgCe

    @h4x0r_fr34k

    1 Sept 2025

    733 Impressions

    3 Retweets

    26 Likes

    7 Bookmarks

    0 Replies

    0 Quotes

  36. CVE-2025-29927: Next.js Middleware Authorization Bypass https://t.co/3F4JkIEfkt #news

    @packet_storm

    1 Sept 2025

    460 Impressions

    2 Retweets

    2 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  37. 【Next.js重大脆弱性で認証バイパス】Next.jsフレームワークに重大な脆弱性CVE-2025-29927が発見され、攻撃者がx-middleware-subrequestヘッダーの不適切な処理を悪用してミドルウェアベースの認証チェックを完全にバイ

    @nakajimeeee

    1 Sept 2025

    482 Impressions

    0 Retweets

    2 Likes

    4 Bookmarks

    0 Replies

    0 Quotes

  38. 🚨 CVE-2025-29927 – Next.js Middleware Bypass A deep technical dive into how x-middleware-subrequest can be exploited to bypass auth checks in Next.js apps. Read the full write-up here 👇 https://t.co/aW3qQjK5oO #NextJS #CVE2025 #WebSecurity #Pentesting #Hacking #BugBoun

    @NullSecurityX

    31 Aug 2025

    2339 Impressions

    10 Retweets

    67 Likes

    36 Bookmarks

    2 Replies

    1 Quote

  39. New YouTube video 😸🔥 🐧Extract | TryHackMe | CVE-2025-29927 | SSRF😸🛸 🐧 TryHackMe Extract Video link in first comment: ⤵️⤵️⤵️🦜🦜🦜 https://t.co/MM57CQhWfT

    @DjalilAyed

    25 Aug 2025

    626 Impressions

    0 Retweets

    4 Likes

    2 Bookmarks

    1 Reply

    0 Quotes

  40. ⚠️ Weekly vuln radar. https://t.co/Cd6L8ACyLV – spot what’s trending before it’s everywhere: CVE-2025-29927 CVE-2025-43300 CVE-2025-57788 (@chudyPB, Sonny) CVE-2025-9132 (@GoogleDeepMind) CVE-2025-9074 CVE-2025-57790 CVE-2025-57789 CVE-2025-57791 CVE-2024-41787

    @ptdbugs

    22 Aug 2025

    127 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  41. CVE-2025-29927 Exploitation : X-Nextjs-Data: 1 X-Middleware-Subrequest: src/middleware:nowaf:src/middleware:src/middleware:src/middleware:src/middleware:middleware:middleware:nowaf:middleware:middleware:middleware:pages/_middleware https://t.co/yMOPQxUFiP

    @h4x0r_fr34k

    21 Aug 2025

    9684 Impressions

    57 Retweets

    246 Likes

    162 Bookmarks

    1 Reply

    0 Quotes

  42. In March, @vercel faced intense criticism for a critical 9.1-rated vulnerability (CVE-2025-29927) in Next.js middleware, with many accusing the company of slow disclosure and poor communication with customers. Competing tech CEOs publicly called out Vercel’s handling of the iss

    @RoryCrave

    12 Aug 2025

    23 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  43. (🧵Thread) 🔎 In this week’s Threat Alert Newsletter: CVE-2025-29927, an authentication bypass in Next.js is drawing fresh attention from attackers. CrowdSec CTI has observed a sharp uptick in exploitation attempts across our global network. We break down why this 3-month-

    @Crowd_Security

    4 Aug 2025

    303 Impressions

    0 Retweets

    2 Likes

    1 Bookmark

    1 Reply

    0 Quotes

  44. PoC CVE-2025-29927: Middleware Bypass + RCE in Next.js | Python Exploit | Bug Hunters & Ethical Hacking. Link to the video on YouTube, please subscribe. https://t.co/QBotfpZyMd https://t.co/ROW4tOJC6E

    @Z3R0NYX

    28 Jul 2025

    160 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  45. [CRITICAL] #CVE-2025-29927 A #vulnerability in Next.js web apps allowing an attacker to bypass authorization checks by spoofing the internal x-middleware-subrequest HTTP header. • Is it Exploitable? Yes! More: Recommended upgrade & additional workaround https://t.co/VWmAsH

    @jed_security_

    18 Jul 2025

    7 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  46. #LSPPDay45 🧠Pwned NeuroSync-D Sherlock! Emulated a full attack chain on a vulnerable web server exploiting CVE-2025-29927, then flipped to blue team mode to analyze logs and trace the intrusion.https://t.co/DA3uCjPOth #60DaysOfLearning2025 #LearningWithLeapfrog @lftechnology

    @imsushxnt

    15 Jul 2025

    13 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  47. 🚨Alert📷<📷x; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px;"> CVE-2025-29927: Next.js Middleware Bypass Vulnerability 📷Hunter Link:https://t.co/pxrkIDWqaK… 📷Query HUNTER : ="Next.js" FOFA : product="NEXT.JS" SHODAN : Next

    @hir0k1sawada

    22 Jun 2025

    9 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  48. 🚨Alert📷 CVE-2025-29927: Next.js Middleware Bypass Vulnerability 📷 9.5M+ Services are found on the yearly. 📷Hunter Link:https://t.co/pxrkIDWqaK 📷Query HUNTER : https://t.co/eaT5Y5MzzK="Next.js" FOFA : product="NEXT.JS" SHODAN : Next.js 👇

    @hir0k1sawada

    22 Jun 2025

    11 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  49. "Critical Next.js Middleware Bypass Affects Popular AI Apps (CVE-2025-29927)" by Sharon #DEVCommunity #ai #bypass #vulnerabilities #cybersecurity https://t.co/IsK1vq35m0

    @Sharon18866

    16 Jun 2025

    103 Impressions

    0 Retweets

    2 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  50. 🚨 A critical vulnerability (CVE-2025-29927) in Next.js allows attackers to bypass middleware logic, risking authentication and security in popular AI apps. Upgrade to patched versions 14.2.25 or 15.2.3 to stay safe! 🛡️ #Nextjs #Cybersecurity @SharonTech https://t.co/wjHOJ

    @prod42net

    16 Jun 2025

    41 Impressions

    0 Retweets

    1 Like

    0 Bookmarks

    0 Replies

    0 Quotes

Configurations