POC详情: eb4f0ca11935e1d0e94ad52a6c58637443b7e9d7

来源
关联漏洞
标题: Next.js 安全漏洞 (CVE-2025-29927)
描述:Next.js是Vercel开源的一个 React 框架。 Next.js 14.2.25之前版本和15.2.3之前版本存在安全漏洞,该漏洞源于如果授权检查发生在中间件中,可能绕过授权检查。
描述
Nuclei Template: CVE-2025-29927 - Next.js Middleware Authentication Bypass
介绍
# Nuclei Template: CVE-2025-29927 - Next.js Middleware Authentication Bypass
Description:
This Nuclei template detects CVE-2025-29927, a critical authentication bypass vulnerability in Next.js. The flaw allows attackers to bypass middleware-based authorization by adding a specific HTTP header (x-middleware-subrequest: middleware). This issue affects all Next.js versions before 14.2.25 and 15.2.3.

Read More: https://zhero-web-sec.github.io/research-and-things/nextjs-and-the-corrupt-middleware

## How It Works
The template sends a GET request to the target URL with the malicious header.

If the response returns a 200 status code and contains protected content, the vulnerability is confirmed.

The extractor captures the response content for verification.

## Usage
Run the following command to test for the vulnerability:
```bash
nuclei -u http://10.10.137.3:3000/protected -t CVE-2025-29927.yaml
```
文件快照

[4.0K] /data/pocs/eb4f0ca11935e1d0e94ad52a6c58637443b7e9d7 ├── [ 890] CVE-2025-29927.yaml └── [ 909] README.md 0 directories, 2 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。