Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
New Unauthenticated DoS Vulnerability Crashes Next.js Servers with a Single Request

New Unauthenticated DoS Vulnerability Crashes Next.js Servers with a Single Request

Posted on November 27, 2025November 27, 2025 By CWS

A newly found essential vulnerability within the Subsequent.js framework permits attackers to crash self-hosted servers utilizing a single HTTP request, requiring negligible sources to execute.

Found by researchers at Concord Intelligence, the denial-of-service (DoS) flaw impacts widespread variations of the framework, together with the newest 15.x department previous to the patch.​

The vulnerability resides within the cloneBodyStream perform inside body-streams.ts, a element chargeable for copying streamed requests into reminiscence earlier than passing them to middleware. Not like typical useful resource exhaustion assaults that require flooding a community, this flaw exploits an absence of dimension limits on the inner reminiscence buffer.​

In response to the disclosure, an attacker can ship an infinite stream of knowledge chunks to the server. Whereas the attacker can launch every chunk from their very own reminiscence instantly after sending, the Subsequent.js server makes an attempt to buffer the complete stream in RAM.

This asymmetry means a tool with minimal sources described by researchers as a “sensible toaster” can efficiently crash a sturdy enterprise server by exhausting its reminiscence.​

Concord Intelligence found the flaw by chance whereas testing an AI AppSec Agent in opposition to a unique, recognized vulnerability, the authentication bypass tracked as CVE-2025-29927.

In the course of the check, the agent autonomously executed a proof-of-concept script that crashed the demo utility, revealing the zero-day flaw within the underlying Subsequent.js framework.​

Affected Methods and Influence

The vulnerability particularly impacts self-hosted Subsequent.js functions that make the most of middleware. Purposes hosted instantly on Vercel’s infrastructure are unaffected by this concern, Concord stated.

Provided that roughly 55% of Subsequent.js deployments are self-hosted (rising to 80% amongst enterprises), the potential assault floor is important.​

Presently, no CVE identifier has been assigned, although a request has been lodged. Researchers have advisable a CVSS v3.1 severity rating of seven.5 (Excessive), citing the low barrier to entry and lack of authentication required to execute the assault.​

Vercel patched the vulnerability on October 13, 2025, introducing a default 10MB restrict on the inner buffer dimension. Directors are urged to improve instantly or implement strict proxy-level constraints.​

ComponentStatus / RecommendationVulnerability TypeUnauthenticated Denial of Service (DoS)Affected VersionsNext.js 15.x (<= 15.5.4), 14.x, 13.x, and olderPatched Versions15.5.5, 16.0.0, or newerPrimary MitigationUpgrade to a patched model immediatelyWorkaroundConfigure a reverse proxy (e.g., Nginx) to implement client_max_body_size limits

Researchers emphasize that commonplace rate-limiting options are ineffective in opposition to this assault as a result of the crash happens earlier than middleware-based price limiters can course of the request. Equally, Subsequent.js’s built-in bodyParser.sizeLimit configuration doesn’t forestall this particular reminiscence exhaustion vector.​

The invention underscores the significance of defense-in-depth methods for self-hosted architectures. Whereas upgrading is the definitive repair, putting a correctly configured reverse proxy in entrance of utility servers stays a essential greatest apply for rejecting outsized requests earlier than they attain the applying layer.

Comply with us on Google Information, LinkedIn, and X for day by day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Crashes, DoS, Next.js, Request, Servers, Single, Unauthenticated, Vulnerability

Post navigation

Previous Post: North Korean Hackers Evade UN Sanctions Leveraging Cyber Capabilities, IT Workers and Crypto Activities
Next Post: Microsoft Teams Guest Chat Vulnerability Exposes Users to Malware Attack

Related Posts

New Rust-based InfoStealer via Fake CAPTCHA Delivers EDDIESTEALER New Rust-based InfoStealer via Fake CAPTCHA Delivers EDDIESTEALER Cyber Security News
DNN Vulnerability Let Attackers Steal NTLM Credentials via Unicode Normalization Bypass DNN Vulnerability Let Attackers Steal NTLM Credentials via Unicode Normalization Bypass Cyber Security News
Hackers Trick Users to Download Weaponized Microsoft Teams to Gain Remote Access Hackers Trick Users to Download Weaponized Microsoft Teams to Gain Remote Access Cyber Security News
CISA Releases Best Security Practices Guide for Hardening Microsoft Exchange Server CISA Releases Best Security Practices Guide for Hardening Microsoft Exchange Server Cyber Security News
Cl0P Ransomware Group Allegedly Claims Breach of Entrust in Oracle 0-Day EBS Hack Cl0P Ransomware Group Allegedly Claims Breach of Entrust in Oracle 0-Day EBS Hack Cyber Security News
5 Malicious Chrome Extensions Attacking Enterprise HR and ERP Platforms for Complete Takeover 5 Malicious Chrome Extensions Attacking Enterprise HR and ERP Platforms for Complete Takeover Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News