<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Next (&gt;= 12.2.0, &lt; 15.5.16) — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/next--12.2.0--15.5.16/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 11 May 2026 15:56:51 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/next--12.2.0--15.5.16/feed.xml" rel="self" type="application/rss+xml"/><item><title>Next.js i18n Pages Router Middleware Authentication Bypass (CVE-2026-44573)</title><link>https://feed.craftedsignal.io/briefs/2026-05-nextjs-auth-bypass/</link><pubDate>Mon, 11 May 2026 15:56:51 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-nextjs-auth-bypass/</guid><description>Next.js applications using the Pages Router with `i18n` and middleware-based authorization are vulnerable to an authentication bypass (CVE-2026-44573), allowing unauthorized access to protected page data via locale-less `/_next/data/&lt;buildId&gt;/&lt;page&gt;.json` requests.</description><content:encoded><![CDATA[<p>Next.js applications using the Pages Router with <code>i18n</code> enabled and relying on middleware or proxy-based authorization are susceptible to an authentication bypass vulnerability, tracked as CVE-2026-44573. This vulnerability affects Next.js versions 12.2.0 through 15.5.15 and 16.0.0 through 16.2.4.  The vulnerability stems from the fact that middleware does not execute for unprefixed <code>/_next/data/&lt;buildId&gt;/&lt;page&gt;.json</code> data routes when using <code>i18n</code>. An attacker can exploit this to directly retrieve server-side rendered (SSR) JSON data for protected pages, effectively bypassing the intended authorization checks implemented within the middleware. This allows access to sensitive content without proper authentication or authorization.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a Next.js application using the Pages Router with <code>i18n</code> configured.</li>
<li>The attacker identifies a protected page that requires authentication or authorization based on middleware.</li>
<li>The attacker crafts a request to <code>/_next/data/&lt;buildId&gt;/&lt;page&gt;.json</code> for the protected page, omitting any locale prefix. The <code>&lt;buildId&gt;</code> would be a valid build ID for the application, typically obtained from the HTML source of a page. The <code>&lt;page&gt;</code> is the path to the page.</li>
<li>The Next.js server processes the request for the <code>/_next/data</code> route, but the middleware intended to protect the page is not triggered.</li>
<li>The server fetches and returns the SSR JSON data for the protected page.</li>
<li>The attacker receives the SSR JSON data, gaining access to the content of the protected page without proper authorization.</li>
<li>The attacker analyzes the data, potentially finding sensitive information or API keys.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows unauthorized access to sensitive data within Next.js applications. The impact depends on the nature of the data exposed on the protected pages. This could include personal user information, internal application data, or even API keys. This could lead to data breaches, account compromise, or further attacks against the application or its users.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to Next.js version 15.5.16 or 16.2.5 or later to patch CVE-2026-44573.</li>
<li>If immediate upgrade is not possible, enforce authorization checks within the <code>getServerSideProps</code> or <code>getStaticProps</code> functions of affected pages as a workaround.</li>
<li>Deploy the Sigma rule &ldquo;Detect Next.js i18n Auth Bypass Attempt&rdquo; to identify potential exploitation attempts targeting the <code>/_next/data</code> endpoint.</li>
<li>Monitor web server logs for requests to the <code>/_next/data</code> endpoint without a locale prefix, as this is indicative of potential exploitation.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>nextjs</category><category>authentication-bypass</category><category>vulnerability</category></item></channel></rss>