关联漏洞
描述
Next.js Middleware Authorization Bypass
介绍
# CVE-2025-29927
## Next.js Middleware Authorization Bypass
A critical vulnerability in Next.js middleware allows attackers to bypass authorization checks by manipulating the x-middleware-subrequest header. This flaw affects Next.js versions prior to 14.2.25 and 15.2.3, potentially granting unauthorized access to sensitive resources.
### References:
- [GitHub Advisory](https://github.com/advisories/GHSA-f82v-jwr5-mffw)
- [NVD CVE Details](https://nvd.nist.gov/vuln/detail/CVE-2025-29927)
- [Tenable CVE Details](https://www.tenable.com/cve/CVE-2025-29927)
### Requirements:
- [Nuclei](https://github.com/projectdiscovery/nuclei)
- CVE-2025-29927.yaml template file
### How to Run:
```sh
nuclei -t CVE-2025-29927.yaml -u <target> -headless
```
文件快照
[4.0K] /data/pocs/b6fbc18b39cc5adf73d733034c0f7317de047fa0
├── [2.2K] CVE-2025-29927.yaml
└── [ 752] README.md
0 directories, 2 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。