Critical Security Error in Next.js could spell big problems for JavaScript -Users


  • Scientists see critical vulnerability in next.js
  • If authorizations occur in middleware, they could be bypassed in older versions
  • A patch and a temporary solution are both available, so update now

Experts have warned that there is a critical seriousness error in the next.J’s open source web development framework that allows threat players to bypass approval control.

Security researcher Rachid.a from Zhero Web Security published an in-depth analysis of the results with the vulnerability traced as CVE-2025-29927, and received a severity of 9.1/10 (critical).

Leave a Comment

Your email address will not be published. Required fields are marked *