Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-29927 PoC — Authorization Bypass in Next.js Middleware

Source
Associated Vulnerability
Title:Authorization Bypass in Next.js Middleware (CVE-2025-29927)
Description:Next.js is a React framework for building full-stack web applications. Starting in version 1.11.4 and prior to versions 12.3.5, 13.5.9, 14.2.25, and 15.2.3, it is possible to bypass authorization checks within a Next.js application, if the authorization check occurs in middleware. If patching to a safe version is infeasible, it is recommend that you prevent external user requests which contain the x-middleware-subrequest header from reaching your Next.js application. This vulnerability is fixed in 12.3.5, 13.5.9, 14.2.25, and 15.2.3.
Description
Next.Js 权限绕过漏洞(CVE-2025-29927)
Readme
# CVE-2025-29927
Next.Js 权限绕过漏洞(CVE-2025-29927)

漏洞详情

https://blog.csdn.net/xc_214/article/details/146480922?spm=1001.2014.3001.5501

更多poc见

https://pc.fenchuan8.com/#/index?forum=101158&yqm=DGR4X


#path默认/,多线程默认10

批量检测:

python poc.py -f url.txt -p /path -t 10

单个检测:

python poc.py -u your-ip -p /path -t 10


![image](https://github.com/user-attachments/assets/800e875e-50ce-434f-8726-e0822d2a4d36)
File Snapshot

[4.0K] /data/pocs/7e3204e8e22100e99bd7c71a96f80f6c50b3cb94 ├── [3.7K] NextJs-CVE-2025-29927.py └── [ 468] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →