Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
New Unauthenticated DoS Vulnerability Crashes Next.js Servers with a Single Request

New Unauthenticated DoS Vulnerability Crashes Next.js Servers with a Single Request

Posted on November 27, 2025November 27, 2025 By CWS

A newly found essential vulnerability within the Subsequent.js framework permits attackers to crash self-hosted servers utilizing a single HTTP request, requiring negligible sources to execute.

Found by researchers at Concord Intelligence, the denial-of-service (DoS) flaw impacts widespread variations of the framework, together with the newest 15.x department previous to the patch.​

The vulnerability resides within the cloneBodyStream perform inside body-streams.ts, a element chargeable for copying streamed requests into reminiscence earlier than passing them to middleware. Not like typical useful resource exhaustion assaults that require flooding a community, this flaw exploits an absence of dimension limits on the inner reminiscence buffer.​

In response to the disclosure, an attacker can ship an infinite stream of knowledge chunks to the server. Whereas the attacker can launch every chunk from their very own reminiscence instantly after sending, the Subsequent.js server makes an attempt to buffer the complete stream in RAM.

This asymmetry means a tool with minimal sources described by researchers as a “sensible toaster” can efficiently crash a sturdy enterprise server by exhausting its reminiscence.​

Concord Intelligence found the flaw by chance whereas testing an AI AppSec Agent in opposition to a unique, recognized vulnerability, the authentication bypass tracked as CVE-2025-29927.

In the course of the check, the agent autonomously executed a proof-of-concept script that crashed the demo utility, revealing the zero-day flaw within the underlying Subsequent.js framework.​

Affected Methods and Influence

The vulnerability particularly impacts self-hosted Subsequent.js functions that make the most of middleware. Purposes hosted instantly on Vercel’s infrastructure are unaffected by this concern, Concord stated.

Provided that roughly 55% of Subsequent.js deployments are self-hosted (rising to 80% amongst enterprises), the potential assault floor is important.​

Presently, no CVE identifier has been assigned, although a request has been lodged. Researchers have advisable a CVSS v3.1 severity rating of seven.5 (Excessive), citing the low barrier to entry and lack of authentication required to execute the assault.​

Vercel patched the vulnerability on October 13, 2025, introducing a default 10MB restrict on the inner buffer dimension. Directors are urged to improve instantly or implement strict proxy-level constraints.​

ComponentStatus / RecommendationVulnerability TypeUnauthenticated Denial of Service (DoS)Affected VersionsNext.js 15.x (<= 15.5.4), 14.x, 13.x, and olderPatched Versions15.5.5, 16.0.0, or newerPrimary MitigationUpgrade to a patched model immediatelyWorkaroundConfigure a reverse proxy (e.g., Nginx) to implement client_max_body_size limits

Researchers emphasize that commonplace rate-limiting options are ineffective in opposition to this assault as a result of the crash happens earlier than middleware-based price limiters can course of the request. Equally, Subsequent.js’s built-in bodyParser.sizeLimit configuration doesn’t forestall this particular reminiscence exhaustion vector.​

The invention underscores the significance of defense-in-depth methods for self-hosted architectures. Whereas upgrading is the definitive repair, putting a correctly configured reverse proxy in entrance of utility servers stays a essential greatest apply for rejecting outsized requests earlier than they attain the applying layer.

Comply with us on Google Information, LinkedIn, and X for day by day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Crashes, DoS, Next.js, Request, Servers, Single, Unauthenticated, Vulnerability

Post navigation

Previous Post: North Korean Hackers Evade UN Sanctions Leveraging Cyber Capabilities, IT Workers and Crypto Activities
Next Post: Microsoft Teams Guest Chat Vulnerability Exposes Users to Malware Attack

Related Posts

APT MuddyWater Attacking CFOs Leveraging OpenSSH, Enables RDP, and Scheduled Task APT MuddyWater Attacking CFOs Leveraging OpenSSH, Enables RDP, and Scheduled Task Cyber Security News
Upcoming DMARC Enhancements Discussed by Email Experts Upcoming DMARC Enhancements Discussed by Email Experts Cyber Security News
Microsoft 365 Faces Chrome Compatibility Issues Microsoft 365 Faces Chrome Compatibility Issues Cyber Security News
Cybersecurity Alert: Fake CAPTCHA Attack Endangers Enterprises Cybersecurity Alert: Fake CAPTCHA Attack Endangers Enterprises Cyber Security News
Perseus Malware Threatens Android Devices Globally Perseus Malware Threatens Android Devices Globally Cyber Security News
NCSC Warns of ‘UMBRELLA STAND’ Malware Attacking Fortinet FortiGate Firewalls NCSC Warns of ‘UMBRELLA STAND’ Malware Attacking Fortinet FortiGate Firewalls Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Mythos Excels in Vulnerability Detection, Faces Varied Challenges
  • OpenAI Faces Lawsuit Over ChatGPT Data Sharing Practices
  • Revolutionizing Data Center Security with DPUs
  • Ghostwriter Intensifies Phishing Attacks on Ukraine
  • AI Enhances Security with Realistic Attack Simulations

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Mythos Excels in Vulnerability Detection, Faces Varied Challenges
  • OpenAI Faces Lawsuit Over ChatGPT Data Sharing Practices
  • Revolutionizing Data Center Security with DPUs
  • Ghostwriter Intensifies Phishing Attacks on Ukraine
  • AI Enhances Security with Realistic Attack Simulations

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark