A serious vulnerability was recently discovered that is causing a stir in the Next.js community. It is CVE-2025-29927, a flaw that affects the framework's middleware and could put millions of applications that use it at risk.
What is the CVE-2025-29927 vulnerability?
CVE-2025-29927 (with a critical score of CVSS 9.1) is a flaw that allows attackers to bypass middleware security checks. The middleware in Next.js is responsible for intercepting incoming HTTP requests and is typically used for important things like:
- Access control
- Session validation
- Redirecting
- Adding security headers
The problem is that this vulnerability allows an attacker to manipulate an HTTP request using the x-middleware-subrequest header. With certain specific values, this header can trick middleware into bypassing those security checks that many developers take for granted. In other words, if your app relies on middleware to protect sensitive areas, this vulnerability could leave those sections exposed.
Which versions are at risk?
The vulnerability affects:
-
Next.js 11.1.4 through 13.5.6.
-
Unpatched versions of Next.js 14.x and 15.x
If your application uses middleware to handle authentication, permissions or other security measures, you are most likely at risk.
How is this vulnerability exploited?
The way attackers exploit this flaw varies by version:
-
Older versions (prior to 12.2): The exploit is triggered when the HTTP header includes this line: x-middleware-subrequest: pages/_middleware.
-
Newer versions: Attackers use a repeating pattern in the header to fool the middleware: x-middleware-subrequest: middleware:middleware:middleware.
-
If your project uses a src/-based directory structure, they could also employ this format: x-middleware-subrequest: src/middleware:....
This technique allows attackers to bypass middleware security checks and access protected paths or perform unauthorized actions.
Read more: What is a Cyberattack?
Why is this vulnerability so dangerous?
The risk of CVE-2025-29927 is due to three key factors:
-
No authentication is required for the exploit to work.
-
It silently bypasses the security checks that developers rely on to control access.
-
Its consequences can be severe, including the theft of sensitive data or service disruption.
An analysis by Shodan revealed that there are more than 330,000 instances of Next.js potentially exposed on the Internet, with the United States having the highest number of cases.
How to mitigate the threat?
If you use Next.js, it is important that you take action as soon as possible to protect your application. The Next.js team has already released patches to fix this vulnerability, so the best thing you can do is update to the latest version available.
Which version do you need to install?
-
If you are using version 15.x, upgrade to 15.2.3 or higher.
-
If you are using version 14.x, upgrade to 14.2.25 or higher.
-
If you are on a version between 11.1.4 and 13.5.6, unfortunately there is no patch available, so it is in your best interest to plan a migration as soon as possible.
Can't upgrade right away?
If for some reason you can't upgrade your Next.js right now, there is a workaround: Block external requests that include the x-middleware-subrequest header.
Of course, this blocking must be done at your proxy or network layer (e.g., your CDN or firewall) and not inside your application's middleware, since doing it inside Next.js itself would not solve the problem completely.
This measure helps to reduce the risk, but keep in mind that it could affect some legitimate internal functions of your app, so proceed with caution.
Recommended steps to protect your application
-
Check which version of Next.js you are using and update it if necessary.
-
Analyze your middleware, especially the parts that control access and permissions.
-
Monitor your logs for suspicious requests containing the x-middleware-subrequest header.
-
Update your security models, considering that middleware alone is not enough to protect your application.
Taking these steps will help you keep your application secure and minimize the risk of this vulnerability.