
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2023-46298 affects Next.js versions before 13.4.20-canary.13. The vulnerability stems from a missing cache-control header in empty prefetch responses, which can be cached by Content Delivery Networks (CDNs). The issue was discovered and disclosed in October 2023 (NVD, CVE).
The vulnerability occurs when Next.js fails to include a cache-control header for empty prefetch responses. This technical oversight allows CDNs to cache these empty responses. The severity of this vulnerability is rated as HIGH with a CVSS v3.1 base score of 7.5 (Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) (NVD).
When exploited, this vulnerability can cause a denial of service condition affecting all users requesting the same URL through the affected CDN. This occurs because the CDN caches and serves the empty response instead of forwarding the request to the origin server (NVD).
The vulnerability was patched in Next.js version 13.4.20-canary.13. Users should upgrade to this version or later to resolve the issue. The fix involves adding proper cache-control headers for prefetch empty responses (Github PR).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."