Skip to main content

Critical Vulnerability in Next.js React Framework

Next.js releases security update to address critical improper authentication vulnerability 

Report a cyber attack: call 0300 303 5222 or email [email protected]

Summary

Next.js releases security update to address critical improper authentication vulnerability 


Threat details

Proof-of-Concept exploit for CVE-2025-29927

A public proof-of-concept exploit is available for CVE-2025-29927. The NHS England National CSOC assesses that exploitation of this vulnerability is considered more likely.


Introduction

Next.js have released a security update to address a critical vulnerability within the Next.js React framework. 

CVE-2025-29927 is an improper authentication vulnerability, with a CVSSv3 score of 9.1. The vulnerability enables a user to skip running middleware in a Next.js application. As a result, an attacker might be able to skip authentication checks that occur in middleware.


Threat updates

Date Update
7 Apr 2025 Proof-of-Concept exploit for CVE-2025-29927

Remediation advice

Affected organisations are encouraged to review the Next.js security advisory and apply the relevant updates as soon as practicable. 

If patching to a safe version is not possible, it is recommended to prevent external user requests with the x-middleware-subrequest header from reaching the Next.js application.


Definitive source of threat updates


Last edited: 7 April 2025 11:55 am