<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Next (&lt; 15.5.16) — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/next--15.5.16/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 11 May 2026 15:59:02 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/next--15.5.16/feed.xml" rel="self" type="application/rss+xml"/><item><title>Next.js Cache Components Vulnerable to Denial-of-Service via Connection Exhaustion (CVE-2026-44579)</title><link>https://feed.craftedsignal.io/briefs/2026-05-nextjs-dos/</link><pubDate>Mon, 11 May 2026 15:59:02 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-nextjs-dos/</guid><description>Next.js applications using Partial Prerendering through Cache Components are vulnerable to connection exhaustion (CVE-2026-44579), where crafted POST requests to a server action trigger a request-body handling deadlock, consuming server capacity and leading to denial of service.</description><content:encoded><![CDATA[<p>A denial-of-service vulnerability (CVE-2026-44579) exists in Next.js applications that utilize Partial Prerendering through the Cache Components feature. This flaw allows an attacker to exhaust server connections by sending specially crafted POST requests to a server action. The malicious requests trigger a deadlock in request-body handling, causing connections to remain open for an extended period. This leads to the consumption of file descriptors and server capacity, ultimately denying service to legitimate users. The vulnerability affects Next.js versions 15.0.0 up to 15.5.16 and 16.0.0 up to 16.2.5. The fix implemented involves treating the <code>Next-Resume</code> header as internal-only and stripping it from untrusted incoming requests to prevent external manipulation.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a Next.js application using Partial Prerendering and Cache Components.</li>
<li>The attacker crafts a malicious POST request targeted at a server action endpoint.</li>
<li>The malicious POST request includes a <code>Next-Resume</code> header, intended to exploit the partial prerendering mechanism.</li>
<li>The Next.js application, upon receiving the crafted request, enters a deadlock state while processing the request body.</li>
<li>The connection remains open and consumes server resources, including file descriptors.</li>
<li>The attacker sends multiple such malicious POST requests concurrently, amplifying the resource consumption.</li>
<li>The server&rsquo;s capacity to handle new connections diminishes due to the exhausted resources.</li>
<li>Legitimate users are denied service as the server is unable to accept new connections or process their requests, resulting in a denial-of-service condition.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-44579 leads to a denial-of-service condition, rendering Next.js applications unavailable to legitimate users. The number of victims is directly proportional to the attacker&rsquo;s ability to send concurrent malicious requests and the server&rsquo;s capacity to handle connections. Sectors reliant on Next.js applications for critical services, such as e-commerce, content delivery, and web applications, are particularly vulnerable. The vulnerability can severely impact business operations, causing financial losses, reputational damage, and disruption of services.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Next.js to version 15.5.16 or later for the 15.x branch, or version 16.2.5 or later for the 16.x branch, to incorporate the fix for CVE-2026-44579.</li>
<li>As a temporary workaround, block incoming requests containing the <code>Next-Resume</code> header at the edge to prevent exploitation until the upgrade can be performed (see Overview).</li>
<li>Deploy the Sigma rule <code>Detect Suspicious Next-Resume Header</code> to identify potential exploitation attempts by monitoring for the presence of the <code>Next-Resume</code> header in incoming HTTP requests.</li>
<li>Monitor web server access logs for a high volume of POST requests to server action endpoints, which could indicate an attempted denial-of-service attack, and correlate with the <code>Next-Resume</code> header to refine detection.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>denial-of-service</category><category>connection-exhaustion</category><category>next.js</category><category>cve-2026-44579</category></item></channel></rss>