CVE-2025-57822
Wolfi Análisis y mitigación de vulnerabilidades

Vista general

Next.js, a React framework for building full-stack web applications, disclosed a vulnerability (CVE-2025-57822) affecting versions prior to 14.2.32 and 15.4.7. The vulnerability was discovered when next() was used without explicitly passing the request object, which could lead to Server-Side Request Forgery (SSRF) in self-hosted applications that incorrectly forwarded user-supplied headers (NVD, GitHub Advisory).

Técnicas

The vulnerability lies in how Next.js middleware responses with a Location header are processed. The issue occurred in the getResolveRoutes function within packages/next/src/server/lib/router-utils/resolve-routes.ts, where any response from middleware containing a Location header was treated as a redirect regardless of the HTTP status code. The vulnerability has a CVSS v3.1 base score of 6.5 (Medium) with a vector string of CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N (Miggo, GitHub Advisory).

Impacto

In affected configurations, attackers could influence the destination of internal requests triggered by middleware routing logic, perform SSRF against internal infrastructure if user-controlled headers were forwarded without validation, and potentially access sensitive internal resources or services unintentionally exposed via internal redirect behavior. This issue is primarily exploitable in self-hosted deployments where developers use custom middleware logic and do not adhere to documented usage of NextResponse.next({ request }) (Vercel Changelog).

Mitigación y soluciones alternativas

The vulnerability has been patched in Next.js versions 14.2.32 and 15.4.7. For users who cannot upgrade immediately, recommended workarounds include: ensuring middleware follows official guidance by using NextResponse.next({ request }) to explicitly pass the request object, avoiding forwarding user-controlled headers to downstream systems without validation, and ensuring headers that should never be sent from client to server are not reflected back via NextResponse.next (Vercel Changelog).

Reacciones de la comunidad

The vulnerability was responsibly disclosed by Nicolas Lamoureux and the Latacora team. Vercel responded by quickly releasing patches and applying fixes to protect their infrastructure customers running affected versions by August 25th, 2025 (Vercel Changelog).

Recursos adicionales


FuenteEste informe se generó utilizando IA

Relacionado Wolfi Vulnerabilidades:

CVE ID

Severidad

Puntuación

Tecnologías

Nombre del componente

Exploit de CISA KEV

Tiene arreglo

Fecha de publicación

CVE-2025-44005CRITICAL10
  • WolfiWolfi
  • step-certificates
NoDec 03, 2025
CVE-2025-66506HIGH7.5
  • PodmanPodman
  • buildah
NoDec 04, 2025
CVE-2025-65637HIGH7.5
  • cAdvisorcAdvisor
  • docker-credential-gcr
NoDec 04, 2025
CVE-2025-61727MEDIUM6.5
  • cAdvisorcAdvisor
  • prometheus-redis-exporter-fips
NoDec 03, 2025
CVE-2025-66406MEDIUM5
  • WolfiWolfi
  • caddy
NoDec 03, 2025

Evaluación gratuita de vulnerabilidades

Compare su postura de seguridad en la nube

Evalúe sus prácticas de seguridad en la nube en 9 dominios de seguridad para comparar su nivel de riesgo e identificar brechas en sus defensas.

Solicitar evaluación

Recursos adicionales de Wiz

Obtén una demostración personalizada

¿Listo para ver a Wiz en acción?

"La mejor experiencia de usuario que he visto en mi vida, proporciona una visibilidad completa de las cargas de trabajo en la nube."
David EstlickCISO
"Wiz proporciona un panel único para ver lo que ocurre en nuestros entornos en la nube."
Adam FletcherJefe de Seguridad
"Sabemos que si Wiz identifica algo como crítico, en realidad lo es."
Greg PoniatowskiJefe de Gestión de Amenazas y Vulnerabilidades