CVE-2025-57822
Wolfi 脆弱性の分析と軽減

概要

Next.js, a React framework for building full-stack web applications, disclosed a vulnerability (CVE-2025-57822) affecting versions prior to 14.2.32 and 15.4.7. The vulnerability was discovered when next() was used without explicitly passing the request object, which could lead to Server-Side Request Forgery (SSRF) in self-hosted applications that incorrectly forwarded user-supplied headers (NVD, GitHub Advisory).

技術的な詳細

The vulnerability lies in how Next.js middleware responses with a Location header are processed. The issue occurred in the getResolveRoutes function within packages/next/src/server/lib/router-utils/resolve-routes.ts, where any response from middleware containing a Location header was treated as a redirect regardless of the HTTP status code. The vulnerability has a CVSS v3.1 base score of 6.5 (Medium) with a vector string of CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N (Miggo, GitHub Advisory).

影響

In affected configurations, attackers could influence the destination of internal requests triggered by middleware routing logic, perform SSRF against internal infrastructure if user-controlled headers were forwarded without validation, and potentially access sensitive internal resources or services unintentionally exposed via internal redirect behavior. This issue is primarily exploitable in self-hosted deployments where developers use custom middleware logic and do not adhere to documented usage of NextResponse.next({ request }) (Vercel Changelog).

軽減策と回避策

The vulnerability has been patched in Next.js versions 14.2.32 and 15.4.7. For users who cannot upgrade immediately, recommended workarounds include: ensuring middleware follows official guidance by using NextResponse.next({ request }) to explicitly pass the request object, avoiding forwarding user-controlled headers to downstream systems without validation, and ensuring headers that should never be sent from client to server are not reflected back via NextResponse.next (Vercel Changelog).

コミュニティの反応

The vulnerability was responsibly disclosed by Nicolas Lamoureux and the Latacora team. Vercel responded by quickly releasing patches and applying fixes to protect their infrastructure customers running affected versions by August 25th, 2025 (Vercel Changelog).

関連情報


ソースこのレポートは AI を使用して生成されました

関連 Wolfi 脆弱 性:

CVE 識別子

重大度

スコア

テクノロジー

コンポーネント名

CISA KEV エクスプロイト

修正あり

公開日

CVE-2025-66031HIGH8.7
  • JavaScriptJavaScript
  • opensearch-dashboards-2-fips
いいえはいNov 26, 2025
CVE-2025-12816HIGH8.6
  • JavaScriptJavaScript
  • opensearch-dashboards-3
いいえはいNov 25, 2025
CVE-2025-65965HIGH8.2
  • WolfiWolfi
  • github.com/anchore/grype
いいえはいNov 25, 2025
CVE-2025-66030MEDIUM6.3
  • JavaScriptJavaScript
  • kubeflow-pipelines
いいえはいNov 26, 2025
CVE-2025-3261MEDIUM6.2
  • JavaJava
  • thingsboard
いいえはいNov 27, 2025

無料の脆弱性評価

クラウドセキュリティポスチャーのベンチマーク

9つのセキュリティドメインにわたるクラウドセキュリティプラクティスを評価して、リスクレベルをベンチマークし、防御のギャップを特定します。

評価を依頼する

パーソナライズされたデモを見る

実際に Wiz を見てみませんか?​

"私が今まで見た中で最高のユーザーエクスペリエンスは、クラウドワークロードを完全に可視化します。"
デビッド・エストリックCISO (最高情報責任者)
"Wiz を使えば、クラウド環境で何が起こっているかを 1 つの画面で確認することができます"
アダム・フレッチャーチーフ・セキュリティ・オフィサー
"Wizが何かを重要視した場合、それは実際に重要であることを私たちは知っています。"
グレッグ・ポニャトフスキ脅威および脆弱性管理責任者