Critical flaw in Next.js lets hackers bypass authorization
- A critical vulnerability in Next.js allows attackers to bypass authorization checks, tracked as CVE-2025-29927, affecting self-hosted versions using 'next start' with 'output: standalone' according to Next.js' security bulletin.
- The vulnerability enables an attacker to send requests bypassing critical security checks, impacting all Next.js versions before 15.2.3, as stated by researchers Allam Rachid and Allam Yasser.
- Vercel released a patch for the vulnerability on March 18, 2025, and published a security advisory on March 21, 2025, addressing this critical vulnerability.
- Concerns linger regarding Vercel's response and communication about the vulnerability, as indicated by CISO Ty Sbano, who noted, 'There has been understandable concern that our communication with partners during this incident did not meet our typical standards.
Insights by Ground AI
Does this summary seem wrong?
15 Articles
15 Articles
All
Left
Center
2
Right
1
Coverage Details
Total News Sources15
Leaning Left0Leaning Right1Center2Last UpdatedBias Distribution67% Center
Bias Distribution
- 67% of the sources are Center
67% Center
C 67%
R 33%
Factuality
To view factuality data please Upgrade to Premium
Ownership
To view ownership data please Upgrade to Vantage