Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Critical Next.js Framework Vulnerability Let Attackers Bypass Authorization

Posted on September 1, 2025September 1, 2025 By CWS

A newly found important safety vulnerability within the Subsequent.js framework, designated CVE-2025-29927, poses a major menace to internet purposes by permitting malicious actors to fully bypass authorization mechanisms. 

This vulnerability arises from improper dealing with of the x-middleware-subrequest header inside Subsequent.js middleware execution, probably exposing delicate administrative areas and guarded sources to unauthorized entry.

The vulnerability impacts a number of variations of the favored React-based internet framework, with completely different exploitation strategies relying on the precise model in use. 

Key Takeaways1. CVE-2025-29927 exploits x-middleware-subrequest to bypass Subsequent.js authorization.2. Attackers set the header to middleware names to skip checks.3. Grants unauthorized entry, so implement layered safety.

Safety researchers have demonstrated that attackers can manipulate HTTP headers to avoid authentication and authorization controls, having access to restricted areas with out correct credentials.

Subsequent.js Framework Vulnerability

NullSecurityX reviews that the core of this vulnerability lies in Subsequent.js’s middleware processing logic, particularly the way it handles the x-middleware-subrequest header. 

This header was initially designed to forestall infinite middleware loops by figuring out inside subrequests. Nonetheless, flawed implementation permits exterior requests to abuse this mechanism.

The weak code sample follows this construction:

When an attacker contains the suitable x-middleware-subrequest header worth of their HTTP request, the middleware incorrectly identifies it as an inside subrequest and skips authorization checks fully. The exploitation varies throughout Subsequent.js variations:

Model 12.2 and Earlier: Attackers use x-middleware-subrequest: pages/_middleware to bypass middleware situated within the pages listing.

Model 12.2 and Later: The header worth modifications to x-middleware-subrequest: middleware for middleware information named middleware.ts.

Model 13.2.0 and Later: Regardless of recursion depth protections, the elemental vulnerability persists by repeated middleware names within the header.

Sensible exploitation situations exhibit the severity of this vulnerability. Attackers can craft easy HTTP requests to entry protected administrative panels.

This request bypasses middleware safety and grants unauthorized entry to admin performance. 

The vulnerability turns into notably harmful when mixed with JSON Internet Token (JWT) or cookie-based authentication programs, the place the header manipulation permits full circumvention of token validation.

Automated exploitation instruments can systematically check a number of protected routes concurrently. 

Danger FactorsDetailsAffected ProductsNext.js variations ≤ 12.2 (pages/_middleware)Subsequent.js variations ≥ 12.2 and ImpactComplete authorization bypass through middleware skipExploit PrerequisitesAbility to craft HTTP requests with customized x-middleware-subrequest headerCVSS 3.1 Score9.8 (Crucial)

Safety researchers have developed proof-of-concept scripts that iterate by widespread administrative endpoints (/admin, /dashboard, /settings) whereas injecting the malicious header, shortly figuring out weak entry factors throughout whole purposes.

The vulnerability’s impression extends past easy authorization bypass. In purposes that rely solely on Subsequent.js middleware for safety controls, attackers can probably entry delicate consumer knowledge, modify software configurations, or execute administrative capabilities with out correct authentication. 

Organizations working Subsequent.js purposes ought to instantly assess their middleware implementations and apply obtainable safety patches.

This discovery highlights the important significance of defense-in-depth safety methods, the place authorization controls exist at a number of software layers somewhat than relying solely on middleware-based safety mechanisms.

Discover this Story Attention-grabbing! Observe us on Google Information, LinkedIn, and X to Get Extra Prompt Updates.

Cyber Security News Tags:Attackers, Authorization, Bypass, Critical, Framework, Next.js, Vulnerability

Post navigation

Previous Post: New Large-Scale Phishing Attacks Targets Hotelier Via Ads to Gain Access to Property Management Tools
Next Post: Microsoft To Mandate MFA for Accounts Signing In to the Azure Portal

Related Posts

System Admins Beware! Weaponized Putty Ads in Bing Installs Remote Access Tools Cyber Security News
TAG-144 Actors Attacking Government Entities With New Tactics, Techniques, and Procedures Cyber Security News
Google Gemini for Workspace Vulnerability Lets Attackers Hide Malicious Scripts in Emails Cyber Security News
25 Controls, Mapped And Audit-Ready Cyber Security News
10 Best API Protection Tools in 2025 Cyber Security News
New Malware Attack Via “I’m not a Robot Check” to Trick Users into Running Malware Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • How to Use Email Aliases for Privacy
  • 10 Best Cloud Penetration Testing Companies in 2025
  • 10 Best AI penetration Testing Companies in 2025
  • Noisy Bear Targets Kazakhstan Energy Sector With BarrelFire Phishing Campaign
  • “GPUGate” Malware Abuses Uses Google Ads and GitHub to Deliver Advanced Malware Payload

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • How to Use Email Aliases for Privacy
  • 10 Best Cloud Penetration Testing Companies in 2025
  • 10 Best AI penetration Testing Companies in 2025
  • Noisy Bear Targets Kazakhstan Energy Sector With BarrelFire Phishing Campaign
  • “GPUGate” Malware Abuses Uses Google Ads and GitHub to Deliver Advanced Malware Payload

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News