Post

Daniel Púa
Daniel Púa@devploit·
🚨 New Next.js CVE: CVE-2026-44578. High-severity SSRF via WebSocket Upgrade handling in self-hosted Next.js apps using the built-in Node.js server. Unauthenticated. Network-reachable. CVSS 8.6 High. Vercel-hosted deployments are not affected. If you run Next.js on your own infra, read on 🧵
Daniel Púa tweet media
English
2
7
40
3.5K
Daniel Púa
Daniel Púa@devploit·
What happens? A crafted WebSocket Upgrade request can make the Next.js server proxy traffic to an attacker-controlled destination. In self-hosted environments, that can expose internal services, cloud metadata endpoints, or other network-reachable resources from the Next.js host.
English
1
0
1
210
Daniel Púa
Daniel Púa@devploit·
Root cause / fix: WebSocket Upgrade handling missed safety checks that already existed for normal HTTP request proxying. The patch applies those checks to Upgrade handling, so upgrade requests are only proxied when routing has explicitly marked them as safe external rewrites.
English
1
0
0
178
Daniel Púa
Daniel Púa@devploit·
Affected versions: next >= 13.4.13, < 15.5.16 next >= 16.0.0, < 16.2.5 Fixed in: 15.5.16 16.2.5 Quick check from your project: ``` node -p "require('next/package.json').version ```
English
1
0
0
131
Paylaş