Version Latest
CVE-2025-29927: Authentication Bypass in Next.js 2025-29927 (Cross platform)
Requirements
Windows
Size
2 KB

SoftIron authorized as a CVE Numbering Authority (CNA) | SoftIron

 

Critical Security Vulnerability Affecting React-Based Web Applications

πŸ“Œ Advisory Summary

Vulnerability Type: Authentication Bypass (CWE-287)

Affected Versions:

13.0.0 ≀ Next.js < 13.5.9

14.0.0 ≀ Next.js < 14.2.25

15.0.0 ≀ Next.js < 15.2.3

11.1.4 ≀ Next.js < 12.3.5

CVSSv3 Score: 9.1 (Critical) [AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N]

Attack Vector: Remote, unauthenticated

🚨 Impact

Successful exploitation could allow:
βœ“ Unauthorized access to protected routes/pages
βœ“ Bypass of API route authentication
βœ“ Access to sensitive user data

πŸ›‘οΈ Mitigation Steps

Immediate Action:

Upgrade to patched versions:

Next.js 13.5.9+

Next.js 14.2.25+

Next.js 15.2.3+

Next.js 12.3.5+

 

 

Temporary Measures:

// Implement server-side auth validation (Node.js middleware example) export function middleware(request) {  if (!request.nextauth?.user) {    return NextResponse.redirect(new URL('/login', request.url))  } }

 

Detection:

Monitor for unexpected access to protected routes

Audit next-auth or custom auth logs

 

βš™οΈ Technical Details

Root Cause: Improper session validation in getServerSideProps/middleware

Exploit Prerequisites: None (works on default configurations)

Bypass Method: [Details withheld per responsible disclosure]

 

πŸ“œ Vendor Response

The Next.js team has addressed this in:

GitHub Security Advisory

npm package updates

 

πŸ” Additional Resources

 

MITRE CVE Entry

Next.js Documentation

 

#NextJS #WebSecurity #Authentication #CVE202529927 #React