ghsa-3h52-269p-cp9r
Vulnerability from github
Published
2025-05-28 21:52
Modified
2025-06-13 14:41
Severity ?
VLAI Severity ?
Summary
Information exposure in Next.js dev server due to lack of origin verification
Details
Summary
A low-severity vulnerability in Next.js has been fixed in version 15.2.2. This issue may have allowed limited source code exposure when the dev server was running with the App Router enabled. The vulnerability only affects local development environments and requires the user to visit a malicious webpage while npm run dev
is active.
Because the mitigation is potentially a breaking change for some development setups, to opt-in to the fix, you must configure allowedDevOrigins
in your next config after upgrading to a patched version. Learn more.
Learn more: https://vercel.com/changelog/cve-2025-48068
Credit
Thanks to sapphi-red and Radman Siddiki for responsibly disclosing this issue.
{ "affected": [ { "package": { "ecosystem": "npm", "name": "next" }, "ranges": [ { "events": [ { "introduced": "15.0.0" }, { "fixed": "15.2.2" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "npm", "name": "next" }, "ranges": [ { "events": [ { "introduced": "13.0" }, { "fixed": "14.2.30" } ], "type": "ECOSYSTEM" } ] } ], "aliases": [ "CVE-2025-48068" ], "database_specific": { "cwe_ids": [ "CWE-1385" ], "github_reviewed": true, "github_reviewed_at": "2025-05-28T21:52:13Z", "nvd_published_at": "2025-05-30T04:15:48Z", "severity": "LOW" }, "details": "## Summary\n\nA low-severity vulnerability in **Next.js** has been fixed in **version 15.2.2**. This issue may have allowed limited source code exposure when the dev server was running with the App Router enabled. The vulnerability only affects local development environments and requires the user to visit a malicious webpage while `npm run dev` is active.\n\nBecause the mitigation is potentially a breaking change for some development setups, to opt-in to the fix, you must configure `allowedDevOrigins` in your next config after upgrading to a patched version. [Learn more](https://nextjs.org/docs/app/api-reference/config/next-config-js/allowedDevOrigins).\n\nLearn more: https://vercel.com/changelog/cve-2025-48068\n\n## Credit\n\nThanks to [sapphi-red](https://github.com/sapphi-red) and [Radman Siddiki](https://github.com/R4356th) for responsibly disclosing this issue.", "id": "GHSA-3h52-269p-cp9r", "modified": "2025-06-13T14:41:21Z", "published": "2025-05-28T21:52:13Z", "references": [ { "type": "WEB", "url": "https://github.com/vercel/next.js/security/advisories/GHSA-3h52-269p-cp9r" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-48068" }, { "type": "PACKAGE", "url": "https://github.com/vercel/next.js" }, { "type": "WEB", "url": "https://vercel.com/changelog/cve-2025-48068" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:L/VI:N/VA:N/SC:L/SI:N/SA:N", "type": "CVSS_V4" } ], "summary": "Information exposure in Next.js dev server due to lack of origin verification" }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…