next

The React Framework

Version: 15.3.3 registry icon
Safety score
-50
Check your open source dependency risks. Get immediate insight about security, stability and licensing risks.
Security Risks of Known Vulnerabilities
CVE-2025-57822
CWE-918
Threat level: MEDIUM | CVSS score: 5

All users implementing custom middleware logic in self-hosted environments are strongly encouraged to upgrade and verify correct usage of the next() function.



CVE-2026-29057
CWE-444
Threat level: MEDIUM | CVSS score: 5

When Next.js rewrites proxy traffic to an external backend, a crafted DELETE/OPTIONS request using Transfer-Encoding: chunked could trigger request boundary disagreement between the proxy and backend. This could allow request smuggling through rewritten routes.



CVE-2026-27980
CWE-400
Threat level: MEDIUM | CVSS score: 5

The default Next.js image optimization disk cache (/_next/image) did not have a configurable upper bound, allowing unbounded cache growth.



CVE-2025-55182
CWE-502
Threat level: CRITICAL | CVSS score: 9.5

Fixed in: React: 19.0.1, 19.1.2, 19.2.1 Next.js: 15.0.5, 15.1.9, 15.2.6, 15.3.6, 15.4.8, 15.5.7, 16.0.7, 15.6.0-canary.58, 16.1.0-canary.12+



CVE-2025-57752
CWE-524
Threat level: MEDIUM | CVSS score: 5

All users are encouraged to upgrade if they use API routes to serve images that depend on request headers and have image optimization enabled.



CVE-2025-55173
CWE-20
Threat level: MEDIUM | CVSS score: 5

All users relying on images.domains or images.remotePatterns are encouraged to upgrade and verify that external image sources are strictly validated.



CVE-2025-59472
CWE-400
Threat level: MEDIUM | CVSS score: 5

A denial of service vulnerability exists in Next.js versions with Partial Prerendering (PPR) enabled when running in minimal mode. The PPR resume endpoint accepts unauthenticated POST requests with the Next-Resume: 1 header and processes attacker-controlled postponed state data. Two closely related vulnerabilities allow an attacker to crash the server process through memory exhaustion: Unbounded request body buffering: The server buffers the entire POST request body into memory using Buffer.concat() without enforcing any size limit, allowing arbitrarily large payloads to exhaust available memory. Unbounded decompression (zipbomb): The resume data cache is decompressed using inflateSync() without limiting the decompressed output size. A small compressed payload can expand to hundreds of megabytes or gigabytes, causing memory exhaustion. Both attack vectors result in a fatal V8 out-of-memory error (FATAL ERROR: Reached heap limit Allocation failed - JavaScript heap out of memory) causing the Node.js process to terminate. The zipbomb variant is particularly dangerous as it can bypass reverse proxy request size limits while still causing large memory allocation on the server. To be affected, an application must run with experimental.ppr: true or cacheComponents: true configured along with the NEXT_PRIVATE_MINIMAL_MODE=1 environment variable. Strongly consider upgrading to 15.6.0-canary.61 or 16.1.5 to reduce risk and prevent availability issues in Next applications.



CVE-2026-23864
CWE-400
Threat level: HIGH | CVSS score: 8

A specially crafted HTTP request can be sent to any App Router Server Function endpoint that, when deserialized, may trigger excessive CPU usage, out-of-memory exceptions, or server crashes. This can result in denial of service in unpatched environments.



CVE-2025-59471
CWE-400
Threat level: MEDIUM | CVSS score: 5

Strongly consider upgrading to 15.5.10 and 16.1.5 to reduce risk and prevent availability issues in Next applications.



Please note that this component is affected by another vulnerability
0 Critical  |  0 High  |  1 Medium  |  0 Low  |  0 Suggest

Latest safe major: 16.2.1 Scan your application codebase with Meterian to see all known vulnerabilities in your open source software dependencies.


Stability

Stay updated with the latest patches and releases. Plan your sofware desisgn. Avoid common known vulnerabilities fixed by the open source community

Latest patch release:   15.3.9

Latest minor release:   15.5.14

Latest major release:   16.2.1

Licensing

Maintain your licence declarations and avoid unwanted licences to protect your IP the way you intended.

MIT   -   MIT License

Not a wildcard

Not proprietary

OSI Compliant