Next.js is a React framework for building full-stack web applications. In affected versions if a Next.js application is performing authorization in middleware based on pathname, it was possible for this authorization to be bypassed for pages directly under the application's root directory. For example: * [Not affected] `https://example.com/` * [Affected] `https://example.com/foo` * [Not affected] `https://example.com/foo/bar`. This issue is patched in Next.js `14.2.15` and later. If your Next.js application is hosted on Vercel, this vulnerability has been automatically mitigated, regardless of Next.js version. There are no official workarounds for this vulnerability.
References
Link | Resource |
---|---|
https://github.com/vercel/next.js/releases/tag/v14.2.15 | Release Notes |
https://github.com/vercel/next.js/security/advisories/GHSA-7gfc-8cq8-jh5f | Vendor Advisory |
Configurations
History
10 Sep 2025, 15:48
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/vercel/next.js/releases/tag/v14.2.15 - Release Notes | |
References | () https://github.com/vercel/next.js/security/advisories/GHSA-7gfc-8cq8-jh5f - Vendor Advisory | |
CWE | CWE-863 | |
First Time |
Vercel
Vercel next.js |
|
CPE | cpe:2.3:a:vercel:next.js:*:*:*:*:*:node.js:*:* | |
Summary |
|
17 Dec 2024, 19:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-12-17 19:15
Updated : 2025-09-10 15:48
NVD link : CVE-2024-51479
Mitre link : CVE-2024-51479
CVE.ORG link : CVE-2024-51479
JSON object : View
Products Affected
vercel
- next.js