Post

Daniel Púa
Daniel Púa@devploit·
🚨 New Next.js CVE: CVE-2026-44578. High-severity SSRF via WebSocket Upgrade handling in self-hosted Next.js apps using the built-in Node.js server. Unauthenticated. Network-reachable. CVSS 8.6 High. Vercel-hosted deployments are not affected. If you run Next.js on your own infra, read on 🧵
Daniel Púa tweet media
English
2
7
40
3.5K
Daniel Púa
Daniel Púa@devploit·
What happens? A crafted WebSocket Upgrade request can make the Next.js server proxy traffic to an attacker-controlled destination. In self-hosted environments, that can expose internal services, cloud metadata endpoints, or other network-reachable resources from the Next.js host.
English
1
0
1
209
Daniel Púa
Daniel Púa@devploit·
Root cause / fix: WebSocket Upgrade handling missed safety checks that already existed for normal HTTP request proxying. The patch applies those checks to Upgrade handling, so upgrade requests are only proxied when routing has explicitly marked them as safe external rewrites.
English
1
0
0
178
Daniel Púa
Daniel Púa@devploit·
Affected versions: next >= 13.4.13, < 15.5.16 next >= 16.0.0, < 16.2.5 Fixed in: 15.5.16 16.2.5 Quick check from your project: ``` node -p "require('next/package.json').version ```
English
1
0
0
131
Daniel Púa
Daniel Púa@devploit·
Mitigation if you can't patch immediately: - Don't expose the origin Next.js server directly to untrusted networks - Block WebSocket upgrades at your reverse proxy / LB if you don't need them - Reject unexpected absolute-URL request lines - Restrict egress from the Next.js host, especially to metadata and internal-only services
English
1
0
0
105
Daniel Púa
Daniel Púa@devploit·
Important: don't rely only on WAF coverage here. Some providers say a safe generic WAF rule for this SSRF class may break legitimate application behavior. Patch first, then use edge filtering and egress controls as defense-in-depth.
English
1
0
0
141
Paylaş