!Next.js Middleware Bypass (CVE-2025-29927)
by Rat1337 - Sunday March 30, 2025 at 06:53 PM
#1
CVE-2025-29927 is a critical vulnerability in Next.js that allows attackers to bypass authorization checks by manipulating the x-middleware-subrequest
header. This affects versions prior to 14.2.25, 15.2.3, 13.5.9, and 12.3.5. Exploiting this flaw could grant unauthorized access to protected routes. To fix this, update Next.js to the latest patched versions. Additionally, implement secondary validation by adding authentication checks in your API routes, ensuring security isn't reliant solely on middleware.


Hidden Content
You must register or login to view this content.
Reply
#2
thank you for sharing this, cant wait to have a look
Reply
#3
yeahhhh very nice maboyyy
Reply
#4
thank you for sharing this, cant wait to have a look
This forum account is currently banned. Ban Length: (Permanent)
Ban Reason: Leeching.
Reply
#5
thank you for sharing this, cant wait to have a look
Reply
#6
thanks for the bypass
Reply
#7
thank you for sharing this dude
Reply
#8
thanks sir for sharing this dude
Reply
#9
(03-30-2025, 06:53 PM)Rat1337 Wrote: CVE-2025-29927 is a critical vulnerability in Next.js that allows attackers to bypass authorization checks by manipulating the x-middleware-subrequest
header. This affects versions prior to 14.2.25, 15.2.3, 13.5.9, and 12.3.5. Exploiting this flaw could grant unauthorized access to protected routes. To fix this, update Next.js to the latest patched versions. Additionally, implement secondary validation by adding authentication checks in your API routes, ensuring security isn't reliant solely on middleware.

nice bro

(03-30-2025, 06:53 PM)Rat1337 Wrote: CVE-2025-29927 is a critical vulnerability in Next.js that allows attackers to bypass authorization checks by manipulating the x-middleware-subrequest
header. This affects versions prior to 14.2.25, 15.2.3, 13.5.9, and 12.3.5. Exploiting this flaw could grant unauthorized access to protected routes. To fix this, update Next.js to the latest patched versions. Additionally, implement secondary validation by adding authentication checks in your API routes, ensuring security isn't reliant solely on middleware.

nice bro
[url=https://pwnforums.st/search.php?action=finduser&uid=47627]
Reply
#10
lets see what we got here
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  CVE-2025-40554 - SolarWinds Web Help Desk Auth Bypass & RCE PoC miyako 3 73 02-07-2026, 03:32 PM
Last Post: cysc
  POC CVE-2025-24071 caca28sapo1 15 805 02-07-2026, 08:53 AM
Last Post: hacker0123
  HPE OneView RCE Exploit [CVE-2025-37164] Hawx01 8 261 02-06-2026, 07:08 PM
Last Post: hacker0123
  CitrixBleed / CVE-2023-4966 cccp 10 6,797 02-06-2026, 01:36 AM
Last Post: temptest
  WordPress LFI to RCE - CVE-2025-0366 Serious 1 457 02-05-2026, 09:53 AM
Last Post: Sammm89



 Users browsing this thread: