CVE-2024-51479

Next.js is a React framework for building full-stack web applications. In affected versions if a Next.js application is performing authorization in middleware based on pathname, it was possible for this authorization to be bypassed for pages directly under the application's root directory. For example: * [Not affected] `https://example.com/` * [Affected] `https://example.com/foo` * [Not affected] `https://example.com/foo/bar`. This issue is patched in Next.js `14.2.15` and later. If your Next.js application is hosted on Vercel, this vulnerability has been automatically mitigated, regardless of Next.js version. There are no official workarounds for this vulnerability.
Configurations

Configuration 1 (hide)

cpe:2.3:a:vercel:next.js:*:*:*:*:*:node.js:*:*

History

No history.

Information

Published : 2024-12-17 19:15

Updated : 2025-09-10 15:48


NVD link : CVE-2024-51479

Mitre link : CVE-2024-51479

CVE.ORG link : CVE-2024-51479


JSON object : View

Products Affected

vercel

  • next.js
CWE
CWE-285

Improper Authorization

CWE-863

Incorrect Authorization