CVE-2025-49826
Description
Next.js is a React framework for building full-stack web applications. From versions 15.0.4-canary.51 to before 15.1.8, a cache poisoning bug leading to a Denial of Service (DoS) condition was found in Next.js. This issue does not impact customers hosted on Vercel. Under certain conditions, this issue may allow a HTTP 204 response to be cached for static pages, leading to the 204 response being served to all users attempting to access the page. This issue has been addressed in version 15.1.8.
CWE
- CWE-444 — CWE-444: Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')
Affected
- vercel / next.js — v=>= 15.0.4-canary.51, < 15.1.8 [affected]
CVSS
- 3.1 score=7.5 severity=HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
References
- https://github.com/vercel/next.js/security/advisories/GHSA-67rr-84xm-4c7r x_refsource_CONFIRM
- https://github.com/vercel/next.js/commit/a15b974ed707d63ad4da5b74c1441f5b7b120e93 x_refsource_MISC
- https://github.com/vercel/next.js/releases/tag/v15.1.8 x_refsource_MISC
- https://vercel.com/changelog/cve-2025-49826 x_refsource_MISC
Source
cvelistV5-main/cves/2025/49xxx/CVE-2025-49826.json