CVE-2024-51479

Next.js is a React framework for building full-stack web applications. In affected versions if a Next.js application is performing authorization in middleware based on pathname, it was possible for this authorization to be bypassed for pages directly under the application's root directory. For example: * [Not affected] `https://example.com/` * [Affected] `https://example.com/foo` * [Not affected] `https://example.com/foo/bar`. This issue is patched in Next.js `14.2.15` and later. If your Next.js application is hosted on Vercel, this vulnerability has been automatically mitigated, regardless of Next.js version. There are no official workarounds for this vulnerability.
Configurations

Configuration 1 (hide)

cpe:2.3:a:vercel:next.js:*:*:*:*:*:node.js:*:*

History

10 Sep 2025, 15:48

Type Values Removed Values Added
CWE CWE-863
First Time Vercel
Vercel next.js
CPE cpe:2.3:a:vercel:next.js:*:*:*:*:*:node.js:*:*
References () https://github.com/vercel/next.js/releases/tag/v14.2.15 - () https://github.com/vercel/next.js/releases/tag/v14.2.15 - Release Notes
References () https://github.com/vercel/next.js/security/advisories/GHSA-7gfc-8cq8-jh5f - () https://github.com/vercel/next.js/security/advisories/GHSA-7gfc-8cq8-jh5f - Vendor Advisory

17 Dec 2024, 19:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-12-17 19:15

Updated : 2025-09-10 15:48


NVD link : CVE-2024-51479

Mitre link : CVE-2024-51479

CVE.ORG link : CVE-2024-51479


JSON object : View

Products Affected

vercel

  • next.js
CWE
CWE-285

Improper Authorization

CWE-863

Incorrect Authorization