CVE-2025-57822
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-08-29

Last updated on: 2025-09-08

Assigner: GitHub, Inc.

Description
Next.js is a React framework for building full-stack web applications. Prior to versions 14.2.32 and 15.4.7, when next() was used without explicitly passing the request object, it could lead to SSRF in self-hosted applications that incorrectly forwarded user-supplied headers. This vulnerability has been fixed in Next.js versions 14.2.32 and 15.4.7. All users implementing custom middleware logic in self-hosted environments are strongly encouraged to upgrade and verify correct usage of the next() function.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-08-29
Last Modified
2025-09-08
Generated
2026-05-07
AI Q&A
2025-08-30
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
vercel next.js to 14.2.32 (exc)
vercel next.js From 15.0.0 (inc) to 15.4.7 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-918 The web server receives a URL or similar request from an upstream component and retrieves the contents of this URL, but it does not sufficiently ensure that the request is being sent to the expected destination.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability in Next.js occurs when the next() function is used without explicitly passing the request object in self-hosted applications that incorrectly forward user-supplied headers. This can lead to Server-Side Request Forgery (SSRF), where an attacker can make the server perform unintended requests.


How can this vulnerability impact me? :

The vulnerability can allow attackers to exploit SSRF to make unauthorized requests from the server, potentially accessing internal resources or sensitive information. This can lead to data exposure or other security issues depending on the server's environment and configuration.


What immediate steps should I take to mitigate this vulnerability?

Upgrade Next.js to version 14.2.32 or 15.4.7 or later. Additionally, verify that any custom middleware logic in self-hosted environments correctly uses the next() function by explicitly passing the request object to avoid SSRF vulnerabilities.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart