CVE-2026-44574

Published May 13, 2026

Last updated 20 hours ago

CVSS high 8.1
Next.js
React Server Components

Overview

AI description

Automated description summarized from trusted sources.

CVE-2026-44574 is a vulnerability affecting Next.js and React Server Components that allows an attacker to bypass middleware defenses. By injecting specially crafted query parameters, an attacker can modify dynamic route values, effectively concealing the true request path from security measures. This manipulation still permits the rendering of protected data on the backend, creating a blind spot within the application's security framework. This flaw requires only low privileges to exploit. The issue was addressed as part of a series of security patches released for React, which included fixes for several other vulnerabilities.

Description
Next.js is a React framework for building full-stack web applications. From 15.4.0 to before 15.5.16 and 16.2.5, applications that rely on middleware to protect dynamic routes can be vulnerable to authorization bypass. In affected deployments, specially crafted query parameters can alter the dynamic route value seen by the page while leaving the visible path unchanged, which can allow protected content to be rendered without passing the expected middleware check. This vulnerability is fixed in 15.5.16 and 16.2.5.
Source
security-advisories@github.com
NVD status
Analyzed
Products
next.js

Risk scores

CVSS 3.1

Type
Secondary
Base score
8.1
Impact score
5.2
Exploitability score
2.8
Vector string
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
Severity
HIGH

Weaknesses

security-advisories@github.com
CWE-288

Social media

Hype score
Not currently trending

Configurations

References

Sources include official advisories and independent security research.