Next.js i18n Pages Router Middleware Authentication Bypass (CVE-2026-44573)
Next.js applications using the Pages Router with `i18n` and middleware-based authorization are vulnerable to an authentication bypass (CVE-2026-44573), allowing unauthorized access to protected page data via locale-less `/_next/data/<buildId>/<page>.json` requests.
Next.js applications using the Pages Router with i18n enabled and relying on middleware or proxy-based authorization are susceptible to an authentication bypass vulnerability, tracked as CVE-2026-44573. This vulnerability affects Next.js versions 12.2.0 through 15.5.15 and 16.0.0 through 16.2.4. The vulnerability stems from the fact that middleware does not execute for unprefixed /_next/data/<buildId>/<page>.json data routes when using i18n. An attacker can exploit this to directly retrieve server-side rendered (SSR) JSON data for protected pages, effectively bypassing the intended authorization checks implemented within the middleware. This allows access to sensitive content without proper authentication or authorization.
Attack Chain
- The attacker identifies a Next.js application using the Pages Router with
i18nconfigured. - The attacker identifies a protected page that requires authentication or authorization based on middleware.
- The attacker crafts a request to
/_next/data/<buildId>/<page>.jsonfor the protected page, omitting any locale prefix. The<buildId>would be a valid build ID for the application, typically obtained from the HTML source of a page. The<page>is the path to the page. - The Next.js server processes the request for the
/_next/dataroute, but the middleware intended to protect the page is not triggered. - The server fetches and returns the SSR JSON data for the protected page.
- The attacker receives the SSR JSON data, gaining access to the content of the protected page without proper authorization.
- The attacker analyzes the data, potentially finding sensitive information or API keys.
Impact
Successful exploitation of this vulnerability allows unauthorized access to sensitive data within Next.js applications. The impact depends on the nature of the data exposed on the protected pages. This could include personal user information, internal application data, or even API keys. This could lead to data breaches, account compromise, or further attacks against the application or its users.
Recommendation
- Upgrade to Next.js version 15.5.16 or 16.2.5 or later to patch CVE-2026-44573.
- If immediate upgrade is not possible, enforce authorization checks within the
getServerSidePropsorgetStaticPropsfunctions of affected pages as a workaround. - Deploy the Sigma rule “Detect Next.js i18n Auth Bypass Attempt” to identify potential exploitation attempts targeting the
/_next/dataendpoint. - Monitor web server logs for requests to the
/_next/dataendpoint without a locale prefix, as this is indicative of potential exploitation.
Detection coverage 2
Detect Next.js i18n Auth Bypass Attempt
highDetects CVE-2026-44573 exploitation — attempts to bypass authentication on Next.js applications using i18n by requesting `/_next/data` without locale prefix.
Detect Next.js Data Directory Access Attempt
mediumDetects access to the Next.js data directory, which can be used to expose application data in an i18n bypass.
Detection queries are available on the platform. Get full rules →