Next.js Improper Middleware Redirect Handling Leads to SSRF
Package
Affected versions
< 14.2.32
>= 15.0.0-canary.0, < 15.4.7
Patched versions
14.2.32
15.4.7
Description
Published to the GitHub Advisory Database
Aug 29, 2025
Reviewed
Aug 29, 2025
Published by the National Vulnerability Database
Aug 29, 2025
Last updated
Sep 1, 2025
A vulnerability in Next.js Middleware has been fixed in v14.2.32 and v15.4.7. The issue occurred when request headers were directly passed into
NextResponse.next()
. In self-hosted applications, this could allow Server-Side Request Forgery (SSRF) if certain sensitive headers from the incoming request were reflected back into the response.All users implementing custom middleware logic in self-hosted environments are strongly encouraged to upgrade and verify correct usage of the
next()
function.More details at Vercel Changelog
References