- Description
- Next.js is a React framework for building full-stack web applications. Starting in version 1.11.4 and prior to versions 12.3.5, 13.5.9, 14.2.25, and 15.2.3, it is possible to bypass authorization checks within a Next.js application, if the authorization check occurs in middleware. If patching to a safe version is infeasible, it is recommend that you prevent external user requests which contain the x-middleware-subrequest header from reaching your Next.js application. This vulnerability is fixed in 12.3.5, 13.5.9, 14.2.25, and 15.2.3.
- Source
- security-advisories@github.com
- NVD status
- Analyzed
- Products
- next.js
CVSS 3.1
- Type
- Secondary
- Base score
- 9.1
- Impact score
- 5.2
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
- Severity
- CRITICAL
- Hype score
- Not currently trending
A vibe-coded Next.js app got a cryptominer. Not from bad prompting. Not from a bad model. The AI pinned a vulnerable dependency. The app passed functional tests. Nobody asked "why this version?" Attacker found CVE-2025-29927. Middleware bypass. Mining binary. 100% CPU. AI
@gremlinworks_
17 Mar 2026
101 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
1/4: Next.js sitenizin kapısını açık mı bıraktınız? (CVE-2025-29927) 🚨 Tüm auth ve CSP katmanınızı tek bir header ile geçmek mümkün. Şu anki meta: **x-middleware-subrequest** suistimali. Nasıl çalıştığını ve korunma yollarını inceleyelim. 🧵 2/
@logapsec
10 Mar 2026
153 Impressions
0 Retweets
1 Like
1 Bookmark
0 Replies
0 Quotes
I just completed Next.js: CVE-2025-29927 room on TryHackMe! Explore an authorisation bypass vulnerability in Next.js. https://t.co/UNic0BXic5 #tryhackme via @tryhackme
@ToTo13ru_xakep
9 Mar 2026
38 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 Nextjs Middleware Bypass Flaw (#CVE-2025-29927): A Deep Dive into the Vulnerability and How to Secure Your Apps + Video https://t.co/EkI4a9gG6E Educational Purposes!
@UndercodeUpdate
23 Feb 2026
26 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
I just completed Next.js: CVE-2025-29927 room on TryHackMe! Explore an authorisation bypass vulnerability in Next.js. https://t.co/mHFw7nPj0s #tryhackme via @tryhackme
@acupunc28094787
22 Feb 2026
43 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 CVE-2026-1281 Critical Code Injection in Ivanti EPMM: What You Should Know 🚨 Discover the key information you need to know about CVE-2025-29927, an authentication bypass vulnerability in the middleware layer in Vercel’s Next.js. Learn more: https://t.co/FBnEhbfv8Y htt
@pluralsight
3 Feb 2026
1136 Impressions
0 Retweets
0 Likes
2 Bookmarks
0 Replies
0 Quotes
🚨 Next.js Middleware Auth Bypass (CVE-2025-29927 | CVSS 9.1) One trusted header. Skipped middleware. Full app compromise. Our research shows how a single request leads to auth bypass, LFI & server takeover. Full blog: https://t.co/s20LKcdmiF Connect - https://t.co/wRAYxGeO
@consult_secnuo
28 Jan 2026
31 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2025-29927: Next.js Middleware Bypass: When 'I'm With The Band' Actually Works https://t.co/YkiB6BgVG9 #security #cybersecurity #cve #ghsa
@_cvereports
12 Jan 2026
12 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Top 5 Trending CVEs: 1 - CVE-2025-43533 2 - CVE-2023-29218 3 - CVE-2026-20029 4 - CVE-2025-55182 5 - CVE-2025-29927 #cve #cvetrends #cveshield #cybersecurity https://t.co/4Fua3CAN6W
@CVEShield
11 Jan 2026
75 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
HackTheBox - Previous ⚙️ Authorization Bypass en Next.js (CVE-2025-29927) 📂 Descarga de archivos via Path Traversal 🔑 Credenciales para SSH 🚀 Privesc con sudo y Terraform https://t.co/qmQvcGDXzd
@sckull_
10 Jan 2026
54 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Previous from @hackthebox_eu features CVE-2025-29927 (NextJS middleware auth bypass), directory traversal for file read, and three ways to abuse a Terraform sudo rule with !env_reset to get root. https://t.co/8wz1Fnbz38
@0xdf_
10 Jan 2026
1974 Impressions
5 Retweets
32 Likes
8 Bookmarks
1 Reply
0 Quotes
Best of 2025: CVE-2025-29927 – Understanding the Next.js Middleware Vulnerability - Security Boulevard https://t.co/7C55OcSEEd
@PVynckier
4 Jan 2026
116 Impressions
1 Retweet
1 Like
0 Bookmarks
0 Replies
0 Quotes
Day 79 of #100DaysOfCybersecurity🛡️ Next.js CVE-2025-29927 lab completed ✅ Analyzed an authorization bypass where a crafted HTTP header skips middleware checks and exposes protected routes ⚠️ Affects Next.js versions before 14.2.25 and 15.2.3. Patch now. https://t.
@HezyChacha
31 Dec 2025
23 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
I just completed Next.js: CVE-2025-29927 room on TryHackMe. Explore an authorisation bypass vulnerability in Next.js. https://t.co/VQjqTYrVDA #tryhackme via @tryhackme
@HezyChacha
31 Dec 2025
36 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
به تازگی گروه هکری با نام PCPcat از دو آسیب پذیری با کد های شناسایی CVE-2025-29927 و CVE-2025-66478 برای نفوذ به سرورها استفاده می کنند. یکی از این آسیب پذیری ها مربوط به آسی
@AmirHossein_sec
25 Dec 2025
57 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Operation PCPcat Hacked 59,000+ Next.js/React Servers Within 48 Hours A massive credential-theft campaign dubbed PCPcat compromised 59,128 Next.js servers in under 48 hours. The operation exploits critical vulnerabilities CVE-2025-29927 and CVE-2025-66478, achieving a 64.6%
@redhuvivek09
25 Dec 2025
161 Impressions
0 Retweets
3 Likes
0 Bookmarks
1 Reply
0 Quotes
🚨 Operation PCPcat: Credential-Stealing Campaign Hijacks 59,000+ Next.js Servers via React/Next.js RCE A mass exploitation campaign is compromising internet-facing Next.js deployments by chaining CVE-2025-29927 and CVE-2025-66478 for RCE, then scraping high-value secrets (.env
@ThreatSynop
25 Dec 2025
3 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 Operation PCPcat Hacked 59,000+ Next.js/React Servers Within 48 Hours Source: https://t.co/O09ua70IX0 A massive credential-theft campaign dubbed PCPcat compromised 59,128 Next.js servers in under 48 hours. The operation exploits critical vulnerabilities CVE-2025-29927 and
@The_Cyber_News
24 Dec 2025
4808 Impressions
34 Retweets
95 Likes
28 Bookmarks
3 Replies
1 Quote
59,128台のNext.jsサーバが48時間でハッキングされた。Beelzebub社報告。CVE-2025-29927とCVE-2025-66478の連鎖。攻撃成功率は64.6%。C2サーバ偵察による調査。活動をOperation PCPcatと命名。 https://t.co/FIwX4EOrYX
@__kokumoto
24 Dec 2025
3471 Impressions
14 Retweets
46 Likes
16 Bookmarks
0 Replies
1 Quote
PCPcat malware compromises 59,000+ servers in under 48 hours via React2Shell exploit, abusing .js/React RCE flaws CVE-2025-29927 and CVE-2025-66478 for unauthenticated remote code execution. #Malware https://t.co/3iSPlAiBTl
@threatcluster
15 Dec 2025
33 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
I just completed Next.js: CVE-2025-29927 room on TryHackMe. Explore an authorisation bypass vulnerability in Next.js. https://t.co/FxrOM7K1yV #tryhackme via @tryhackme
@mXgarweg
13 Dec 2025
35 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
⚠️ SCASH Wallet 安全通报 & 服务状态更新 经过紧急维护,我们的网页钱包现已恢复正常。 区块链浏览器将会在24小时内恢复。 这次问题源自 Next.js 的一个已公开漏洞(CVE-2025-29927)。该漏洞允许攻击者通过构
@Hysanalde
8 Dec 2025
1267 Impressions
7 Retweets
23 Likes
2 Bookmarks
5 Replies
0 Quotes
🚨 Even popular frameworks like Next.js can have serious flaws… Just completed the Next.js: CVE-2025-29927 room on @TryHackMe 🧠💻 Dug into an authorization bypass vulnerability and how attackers can exploit weak access control. 🔗 https://t.co/7npcdvpCc5 #TryHackMe
@BlackLightning5
24 Nov 2025
10 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2025-29927 https://t.co/fmtDlTNkXc
@ExWareLabs
19 Nov 2025
46 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
Want to learn a way to find those hard-hitting critical vulnerabilities? 🐛 CVE-2025-29927 is a vulnerability in Next.JS that can lead to a complete authorization bypass. Watch the video below to get a quick peek and then try the lab yourself 👇 https://t.co/zC6GAAqOB0… h
@Kimcheater_
16 Nov 2025
41 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Next.jsのMiddlewareで認証している方はすぐに確認を!認可バイパス脆弱性(CVE-2025-29927)の解説と対策 https://t.co/IrxQiIPHiR #Qiita
@keigoriankami
10 Nov 2025
18 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2025-29927 - #Next.js Auth Bypass PoC https://t.co/AJsKE1EMUA #hacking
@hack4lifemx
6 Nov 2025
101 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Want to learn a way to find those hard-hitting critical vulnerabilities? 🐛 CVE-2025-29927 is a vulnerability in Next.JS that can lead to a complete authorization bypass. Watch the video below to get a quick peek and then try the lab yourself 👇 https://t.co/U8HN812Oey http
@hackinghub_io
5 Nov 2025
6422 Impressions
23 Retweets
122 Likes
91 Bookmarks
1 Reply
0 Quotes
Post 1/30 : CVE-2025-29927 How to find Vulnerable Assets for it! Steps; 1. Get all domains and IPS Domains >> Subfinder -dL list-of-domain.txt -o subdomains.txt IPs >> shodan search "ssl:'domain.tld'" --fields ip_str --limit 1000 >> ips.txt 2. find their op
@h4x0r_fr34k
19 Oct 2025
11773 Impressions
31 Retweets
249 Likes
272 Bookmarks
1 Reply
1 Quote
Day 1/30 : CVE-2025-29927 How to find Vulnerable Assets for it! Steps; 1. Get all domains and IPS Domains >> Subfinder -dL list-of-domain.txt -o subdomains.txt IPs >> shodan search "ssl:'domain.tld'" --fields ip_str --limit 1000 >> ips.txt 2. find their ope
@h4x0r_fr34k
19 Oct 2025
31 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
I was awarded a $290 bounty on @Hacker0x01! https://t.co/5dbKBrWp1S #TogetherWeHitHarder #bugbountytips Tip: CVE-2025-29927 via /admin https://t.co/sERtc8B1ks
@exploit_msf
4 Oct 2025
3254 Impressions
2 Retweets
127 Likes
15 Bookmarks
2 Replies
0 Quotes
🚨 ¡Nuevo vídeo disponible! Explotando el CVE-2025-29927 en un middleware vulnerable 💥 Desde la detección hasta la PoC funcional. ✅ Identificar versión vulnerable ✅ Conectar Burp y analizar 🎯 Pensamiento ofensivo aplicado. No teoría. 📺 https://t.co/Noy9UEmX
@gorkaelbochi
20 Sept 2025
74 Impressions
0 Retweets
0 Likes
1 Bookmark
0 Replies
0 Quotes
🚨CVE-2025-29927: Next.js Middleware Bypass Vulnerability PoC: https://t.co/olD5JesWY1 Credit: https://t.co/3XCm1VLLsI https://t.co/nIJFC7hjf4
@DarkWebInformer
17 Sept 2025
7723 Impressions
19 Retweets
97 Likes
52 Bookmarks
0 Replies
1 Quote
🚨 ¡Nuevo vídeo ya disponible! 📽️ Explotando el CVE-2025-29927 paso a paso 🧠 Middleware vulnerable → PoC funcional → ejecución real ✅ Detectar versión vulnerable ✅ Analizar el flujo ✅ Construir PoC ✅ Explotación práctica 📺 https://t.co/Noy9UEmXIo
@gorkaelbochi
16 Sept 2025
81 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
💡 ⚒️ ✏️ Ghost-Route - Ghost Route Detects If A Next JS Site Is Vulnerable To The Corrupt Middleware Bypass Bug (CVE-2025-29927) https://t.co/cDC5TeXhMw
@pedri77
15 Sept 2025
46 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 Este martes 16 a las 20:00 subo vídeo: Explotación paso a paso del CVE-2025-29927 🧠 ¿El objetivo? Un middleware vulnerable. Verás: ✅ Qué es middleware ✅ Cómo detectar la versión vulnerable ✅ Cómo explotarlo (real) 💥 Sin teoría. Todo práctico. 💞 ht
@gorkaelbochi
15 Sept 2025
52 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
I just completed Next.js: CVE-2025-29927 room on TryHackMe. Explore an authorisation bypass vulnerability in Next.js. https://t.co/3sLnz8REQ3 #tryhackme via @realtryhackme
@vinnykosgeii
13 Sept 2025
62 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
🚨 Next.js CVE-2025-29927 – Authentication Bypass Explained 🔎 What Happened? A critical vulnerability in Next.js middleware (CVE-2025-29927, CVSS 9.1) allows attackers to bypass authentication and authorization checks. The root cause: improper trust of an internal header
@AnonOzzyDude
8 Sept 2025
55 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
🚨 Unmasking #CVE-2025-29927: The Nextjs Framework Flaw Every Hunter Must Understand https://t.co/ReHVZzwlgw Educational Purposes!
@UndercodeUpdate
7 Sept 2025
40 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Next.jsフレームワークに新たに発見された重大な脆弱性CVE-2025-29927は、 認可機構を完全に回避できる恐れがあり、Webアプリケーションに深刻な影響を及ぼす可能性がある。 問題はx-middleware-subrequestヘッダの不適
@yousukezan
1 Sept 2025
1947 Impressions
6 Retweets
15 Likes
7 Bookmarks
0 Replies
0 Quotes
VIDEO POC CVE-2025-29927 https://t.co/hyIIbdPgCe
@h4x0r_fr34k
1 Sept 2025
733 Impressions
3 Retweets
26 Likes
7 Bookmarks
0 Replies
0 Quotes
CVE-2025-29927: Next.js Middleware Authorization Bypass https://t.co/3F4JkIEfkt #news
@packet_storm
1 Sept 2025
460 Impressions
2 Retweets
2 Likes
0 Bookmarks
1 Reply
0 Quotes
【Next.js重大脆弱性で認証バイパス】Next.jsフレームワークに重大な脆弱性CVE-2025-29927が発見され、攻撃者がx-middleware-subrequestヘッダーの不適切な処理を悪用してミドルウェアベースの認証チェックを完全にバイ
@nakajimeeee
1 Sept 2025
482 Impressions
0 Retweets
2 Likes
4 Bookmarks
0 Replies
0 Quotes
🚨 CVE-2025-29927 – Next.js Middleware Bypass A deep technical dive into how x-middleware-subrequest can be exploited to bypass auth checks in Next.js apps. Read the full write-up here 👇 https://t.co/aW3qQjK5oO #NextJS #CVE2025 #WebSecurity #Pentesting #Hacking #BugBoun
@NullSecurityX
31 Aug 2025
2339 Impressions
10 Retweets
67 Likes
36 Bookmarks
2 Replies
1 Quote
New YouTube video 😸🔥 🐧Extract | TryHackMe | CVE-2025-29927 | SSRF😸🛸 🐧 TryHackMe Extract Video link in first comment: ⤵️⤵️⤵️🦜🦜🦜 https://t.co/MM57CQhWfT
@DjalilAyed
25 Aug 2025
626 Impressions
0 Retweets
4 Likes
2 Bookmarks
1 Reply
0 Quotes
⚠️ Weekly vuln radar. https://t.co/Cd6L8ACyLV – spot what’s trending before it’s everywhere: CVE-2025-29927 CVE-2025-43300 CVE-2025-57788 (@chudyPB, Sonny) CVE-2025-9132 (@GoogleDeepMind) CVE-2025-9074 CVE-2025-57790 CVE-2025-57789 CVE-2025-57791 CVE-2024-41787
@ptdbugs
22 Aug 2025
127 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2025-29927 Exploitation : X-Nextjs-Data: 1 X-Middleware-Subrequest: src/middleware:nowaf:src/middleware:src/middleware:src/middleware:src/middleware:middleware:middleware:nowaf:middleware:middleware:middleware:pages/_middleware https://t.co/yMOPQxUFiP
@h4x0r_fr34k
21 Aug 2025
9684 Impressions
57 Retweets
246 Likes
162 Bookmarks
1 Reply
0 Quotes
In March, @vercel faced intense criticism for a critical 9.1-rated vulnerability (CVE-2025-29927) in Next.js middleware, with many accusing the company of slow disclosure and poor communication with customers. Competing tech CEOs publicly called out Vercel’s handling of the iss
@RoryCrave
12 Aug 2025
23 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
(🧵Thread) 🔎 In this week’s Threat Alert Newsletter: CVE-2025-29927, an authentication bypass in Next.js is drawing fresh attention from attackers. CrowdSec CTI has observed a sharp uptick in exploitation attempts across our global network. We break down why this 3-month-
@Crowd_Security
4 Aug 2025
303 Impressions
0 Retweets
2 Likes
1 Bookmark
1 Reply
0 Quotes
PoC CVE-2025-29927: Middleware Bypass + RCE in Next.js | Python Exploit | Bug Hunters & Ethical Hacking. Link to the video on YouTube, please subscribe. https://t.co/QBotfpZyMd https://t.co/ROW4tOJC6E
@Z3R0NYX
28 Jul 2025
160 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:vercel:next.js:*:*:*:*:*:node.js:*:*",
"matchCriteriaId": "6D275D05-70E5-49CA-BCFE-74B31DB3D8EF",
"versionEndExcluding": "12.3.5",
"versionStartIncluding": "11.1.4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vercel:next.js:*:*:*:*:*:node.js:*:*",
"matchCriteriaId": "49731FD6-617A-42DE-9F95-A7F42809C32F",
"versionEndExcluding": "13.5.9",
"versionStartIncluding": "13.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vercel:next.js:*:*:*:*:*:node.js:*:*",
"matchCriteriaId": "5F836D0E-1580-40C6-93E5-6DB939E7BA86",
"versionEndExcluding": "14.2.25",
"versionStartIncluding": "14.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vercel:next.js:*:*:*:*:*:node.js:*:*",
"matchCriteriaId": "E214D84F-7B55-4089-B1C4-9BF8B7AC7375",
"versionEndExcluding": "15.2.3",
"versionStartIncluding": "15.0.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
]