CVE-2026-44575

Published May 13, 2026

Last updated 20 hours ago

Overview

AI description

Automated description summarized from trusted sources.

CVE-2026-44575 is a vulnerability impacting Next.js App Router applications, enabling attackers to bypass middleware and proxy-based authorization checks. This flaw allows unauthorized access to protected content and potentially sensitive application data. The bypass is achieved by crafting specially formed `.rsc` and `segment-prefetch` URLs that can reach restricted content without triggering the intended security rules. To address this, users are advised to upgrade to Next.js versions 15.5.16 or 16.2.5 or later.

Description
Next.js is a React framework for building full-stack web applications. From 15.2.0 to before 15.5.16 and 16.2.5, App Router applications that rely on middleware or proxy-based checks for authorization can allow unauthorized access through transport-specific route variants used for segment prefetching. In affected configurations, specially crafted .rsc and segment-prefetch URLs can resolve to the same page without being matched by the intended middleware rule, which can allow protected content to be reached without the expected authorization check. This vulnerability is fixed in 15.5.16 and 16.2.5.
Source
security-advisories@github.com
NVD status
Analyzed
Products
next.js

Risk scores

CVSS 3.1

Type
Secondary
Base score
7.5
Impact score
3.6
Exploitability score
3.9
Vector string
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Severity
HIGH

Weaknesses

security-advisories@github.com
CWE-288

Social media

Hype score
Not currently trending

Configurations

References

Sources include official advisories and independent security research.