Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2024-51479 β€” AI Deep Analysis Summary

CVSS 7.5 Β· High

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: Next.js Middleware Authorization Bypass. If you check auth via URL path in middleware, attackers can skip it by accessing the root directory. πŸ“‰ **Consequences**: Unauthorized access to protected pages.…

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **CWE**: CWE-285 (Improper Authorization). πŸ› **Flaw**: Logic error in Middleware. The check relies on `pathname`. Root directory requests bypass this specific path-based check.…

Q3Who is affected? (Versions/Components)

πŸ‘₯ **Vendor**: Vercel. πŸ“¦ **Product**: Next.js. πŸ“… **Affected**: Versions **before 14.2.15**. βœ… **Fixed**: v14.2.15 and later. ⚠️ Check your `package.json` version immediately!

Q4What can hackers do? (Privileges/Data)

πŸ•΅οΈ **Hackers Can**: Bypass login/auth checks. πŸ‘οΈ **Access**: Sensitive pages in the app root. πŸ“‚ **Data**: Read confidential info. πŸ”“ **Privilege**: Gain unauthorized user-level access.…

Q5Is exploitation threshold high? (Auth/Config)

πŸ“Š **Threshold**: LOW. 🌐 **Network**: Remote (AV:N). πŸ”‘ **Auth**: None required (PR:N). πŸ–±οΈ **User**: No interaction needed (UI:N). 🎯 **Complexity**: Low (AC:L). Easy to exploit if the flawed pattern is used.

Q6Is there a public Exp? (PoC/Wild Exploitation)

πŸ” **PoC**: Yes. Link: `github.com/doc0null/nextjs-CVE-2025-55182`. 🌍 **Wild Exploit**: Possible. The logic flaw is straightforward. πŸ“ **Note**: PoC repo name has a typo (2025 vs 2024), but it targets this CVE.…

Q7How to self-check? (Features/Scanning)

πŸ”Ž **Self-Check**: Do you use Middleware for auth? πŸ“ **Pattern**: Do you check `request.nextUrl.pathname`? 🏠 **Risk**: If you protect routes but not the root `/`, you are vulnerable.…

Q8Is it fixed officially? (Patch/Mitigation)

🩹 **Fix**: Upgrade to **Next.js 14.2.15+**. πŸ”— **Official Advisory**: `github.com/vercel/next.js/security/advisories/GHSA-7gfc-8cq8-jh5f`. πŸ“¦ **Release**: `github.com/vercel/next.js/releases/tag/v14.2.15`.…

Q9What if no patch? (Workaround)

🚧 **Workaround**: If you can't upgrade: 1. Avoid path-only checks in Middleware. 2. Add explicit root path handling. 3. Implement session-based auth instead of URL-based.…

Q10Is it urgent? (Priority Suggestion)

πŸ”₯ **Priority**: HIGH. πŸ“… **Published**: 2024-12-17. 🚨 **Urgency**: Critical for apps using Middleware auth. πŸ“‰ **CVSS**: 7.5 (High). ⏳ **Time**: Patch ASAP to prevent data leaks. Don't wait!