Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Critical Next.js Framework Vulnerability Let Attackers Bypass Authorization

Critical Next.js Framework Vulnerability Let Attackers Bypass Authorization

Posted on September 1, 2025September 1, 2025 By CWS

A newly found important safety vulnerability within the Subsequent.js framework, designated CVE-2025-29927, poses a major menace to internet purposes by permitting malicious actors to fully bypass authorization mechanisms. 

This vulnerability arises from improper dealing with of the x-middleware-subrequest header inside Subsequent.js middleware execution, probably exposing delicate administrative areas and guarded sources to unauthorized entry.

The vulnerability impacts a number of variations of the favored React-based internet framework, with completely different exploitation strategies relying on the precise model in use. 

Key Takeaways1. CVE-2025-29927 exploits x-middleware-subrequest to bypass Subsequent.js authorization.2. Attackers set the header to middleware names to skip checks.3. Grants unauthorized entry, so implement layered safety.

Safety researchers have demonstrated that attackers can manipulate HTTP headers to avoid authentication and authorization controls, having access to restricted areas with out correct credentials.

Subsequent.js Framework Vulnerability

NullSecurityX reviews that the core of this vulnerability lies in Subsequent.js’s middleware processing logic, particularly the way it handles the x-middleware-subrequest header. 

This header was initially designed to forestall infinite middleware loops by figuring out inside subrequests. Nonetheless, flawed implementation permits exterior requests to abuse this mechanism.

The weak code sample follows this construction:

When an attacker contains the suitable x-middleware-subrequest header worth of their HTTP request, the middleware incorrectly identifies it as an inside subrequest and skips authorization checks fully. The exploitation varies throughout Subsequent.js variations:

Model 12.2 and Earlier: Attackers use x-middleware-subrequest: pages/_middleware to bypass middleware situated within the pages listing.

Model 12.2 and Later: The header worth modifications to x-middleware-subrequest: middleware for middleware information named middleware.ts.

Model 13.2.0 and Later: Regardless of recursion depth protections, the elemental vulnerability persists by repeated middleware names within the header.

Sensible exploitation situations exhibit the severity of this vulnerability. Attackers can craft easy HTTP requests to entry protected administrative panels.

This request bypasses middleware safety and grants unauthorized entry to admin performance. 

The vulnerability turns into notably harmful when mixed with JSON Internet Token (JWT) or cookie-based authentication programs, the place the header manipulation permits full circumvention of token validation.

Automated exploitation instruments can systematically check a number of protected routes concurrently. 

Danger FactorsDetailsAffected ProductsNext.js variations ≤ 12.2 (pages/_middleware)Subsequent.js variations ≥ 12.2 and ImpactComplete authorization bypass through middleware skipExploit PrerequisitesAbility to craft HTTP requests with customized x-middleware-subrequest headerCVSS 3.1 Score9.8 (Crucial)

Safety researchers have developed proof-of-concept scripts that iterate by widespread administrative endpoints (/admin, /dashboard, /settings) whereas injecting the malicious header, shortly figuring out weak entry factors throughout whole purposes.

The vulnerability’s impression extends past easy authorization bypass. In purposes that rely solely on Subsequent.js middleware for safety controls, attackers can probably entry delicate consumer knowledge, modify software configurations, or execute administrative capabilities with out correct authentication. 

Organizations working Subsequent.js purposes ought to instantly assess their middleware implementations and apply obtainable safety patches.

This discovery highlights the important significance of defense-in-depth safety methods, the place authorization controls exist at a number of software layers somewhat than relying solely on middleware-based safety mechanisms.

Discover this Story Attention-grabbing! Observe us on Google Information, LinkedIn, and X to Get Extra Prompt Updates.

Cyber Security News Tags:Attackers, Authorization, Bypass, Critical, Framework, Next.js, Vulnerability

Post navigation

Previous Post: New Large-Scale Phishing Attacks Targets Hotelier Via Ads to Gain Access to Property Management Tools
Next Post: Microsoft To Mandate MFA for Accounts Signing In to the Azure Portal

Related Posts

TrueConf Vulnerability Added to CISA’s KEV List TrueConf Vulnerability Added to CISA’s KEV List Cyber Security News
Europol‑Backed Operation Leads to 34 Arrests in Black Axe Crime Network Bust Europol‑Backed Operation Leads to 34 Arrests in Black Axe Crime Network Bust Cyber Security News
Google Down For Most Of The Users In Turkey And Eastern Europe Google Down For Most Of The Users In Turkey And Eastern Europe Cyber Security News
Threat Actors Actively Using Open-Source C2 Framework to Deliver Malicious Payloads Threat Actors Actively Using Open-Source C2 Framework to Deliver Malicious Payloads Cyber Security News
ZnDoor Malware Exploiting React2Shell Vulnerability to Compromise Network Devices ZnDoor Malware Exploiting React2Shell Vulnerability to Compromise Network Devices Cyber Security News
Critical Ivanti Endpoint Manager Flaw Raises Security Concerns Critical Ivanti Endpoint Manager Flaw Raises Security Concerns Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • F5 Resolves Over 50 Security Flaws in Software
  • Windows Vulnerabilities: BitLocker Bypass and CTFMON Exploit
  • Seedworm Group Exploits Signed Binaries for Cyber Attacks
  • Vulnerability in PraisonAI Exploited Within Hours
  • Langflow Vulnerability Exploited for AWS Key Theft

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • F5 Resolves Over 50 Security Flaws in Software
  • Windows Vulnerabilities: BitLocker Bypass and CTFMON Exploit
  • Seedworm Group Exploits Signed Binaries for Cyber Attacks
  • Vulnerability in PraisonAI Exploited Within Hours
  • Langflow Vulnerability Exploited for AWS Key Theft

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark