hachyderm.io is one of the many independent Mastodon servers you can use to participate in the fediverse.
Hachyderm is a safe space, LGBTQIA+ and BLM, primarily comprised of tech industry professionals world wide. Note that many non-user account types have restrictions - please see our About page.

Administered by:

Server stats:

9.5K
active users

#cve202529927

0 posts0 participants0 posts today

Critical Next.js Middleware Vulnerability (CVE-2025-29927)

A major auth bypass vulnerability in Next.js middleware (prior to v14.2.25 / v15.2.3) allows attackers to inject the x-middleware-subrequest header and bypass authorization entirely. Exploitable via simple HTTP requests—no user interaction, no special permissions.

Patch. Now. Or block the header manually.

GitHub scored this 9.1 CRITICAL, but the real issue? This flaw exposes a systemic weakness in middleware validation, and some vendors weren’t exactly upfront about the risks.

Details + POC: zeropath.com/blog/nextjs-middl
NVD: nvd.nist.gov/vuln/detail/CVE-2

Security theater is easy. Secure defaults and transparency are harder—but essential.

zeropath.comNext.js Middleware Exploit: CVE-2025-29927 Authorization Bypass - ZeroPath BlogExplore the critical CVE-2025-29927 vulnerability in Next.js middleware, enabling attackers to bypass authorization checks and gain unauthorized access.

🔥 Oh no! The Earth-shattering CVE-2025-29927 has been unleashed, bringing the Next.js universe to its knees...or so they say. 🎭 Apparently, to save humanity, you must update ASAP—because nothing screams urgency like a #vulnerability numbering system that sounds like a barcode. 🥳
nextjs.org/blog/cve-2025-29927 #CVE202529927 #Nextjs #UpdateUrgency #CyberSecurity #HackerNews #ngated

nextjs.org · CVE-2025-29927Next.js version 15.2.3 has been released to address a security vulnerability CVE-2025-29927.