<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Next (&gt;= 16.0.0, &lt; 16.2.5) — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/next--16.0.0--16.2.5/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 11 May 2026 15:56:51 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/next--16.0.0--16.2.5/feed.xml" rel="self" type="application/rss+xml"/><item><title>Next.js i18n Pages Router Middleware Authentication Bypass (CVE-2026-44573)</title><link>https://feed.craftedsignal.io/briefs/2026-05-nextjs-auth-bypass/</link><pubDate>Mon, 11 May 2026 15:56:51 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-nextjs-auth-bypass/</guid><description>Next.js applications using the Pages Router with `i18n` and middleware-based authorization are vulnerable to an authentication bypass (CVE-2026-44573), allowing unauthorized access to protected page data via locale-less `/_next/data/&lt;buildId&gt;/&lt;page&gt;.json` requests.</description><content:encoded><![CDATA[<p>Next.js applications using the Pages Router with <code>i18n</code> enabled and relying on middleware or proxy-based authorization are susceptible to an authentication bypass vulnerability, tracked as CVE-2026-44573. This vulnerability affects Next.js versions 12.2.0 through 15.5.15 and 16.0.0 through 16.2.4.  The vulnerability stems from the fact that middleware does not execute for unprefixed <code>/_next/data/&lt;buildId&gt;/&lt;page&gt;.json</code> data routes when using <code>i18n</code>. An attacker can exploit this to directly retrieve server-side rendered (SSR) JSON data for protected pages, effectively bypassing the intended authorization checks implemented within the middleware. This allows access to sensitive content without proper authentication or authorization.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a Next.js application using the Pages Router with <code>i18n</code> configured.</li>
<li>The attacker identifies a protected page that requires authentication or authorization based on middleware.</li>
<li>The attacker crafts a request to <code>/_next/data/&lt;buildId&gt;/&lt;page&gt;.json</code> for the protected page, omitting any locale prefix. The <code>&lt;buildId&gt;</code> would be a valid build ID for the application, typically obtained from the HTML source of a page. The <code>&lt;page&gt;</code> is the path to the page.</li>
<li>The Next.js server processes the request for the <code>/_next/data</code> route, but the middleware intended to protect the page is not triggered.</li>
<li>The server fetches and returns the SSR JSON data for the protected page.</li>
<li>The attacker receives the SSR JSON data, gaining access to the content of the protected page without proper authorization.</li>
<li>The attacker analyzes the data, potentially finding sensitive information or API keys.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows unauthorized access to sensitive data within Next.js applications. The impact depends on the nature of the data exposed on the protected pages. This could include personal user information, internal application data, or even API keys. This could lead to data breaches, account compromise, or further attacks against the application or its users.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to Next.js version 15.5.16 or 16.2.5 or later to patch CVE-2026-44573.</li>
<li>If immediate upgrade is not possible, enforce authorization checks within the <code>getServerSideProps</code> or <code>getStaticProps</code> functions of affected pages as a workaround.</li>
<li>Deploy the Sigma rule &ldquo;Detect Next.js i18n Auth Bypass Attempt&rdquo; to identify potential exploitation attempts targeting the <code>/_next/data</code> endpoint.</li>
<li>Monitor web server logs for requests to the <code>/_next/data</code> endpoint without a locale prefix, as this is indicative of potential exploitation.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>nextjs</category><category>authentication-bypass</category><category>vulnerability</category></item><item><title>Next.js Middleware Authorization Bypass via Dynamic Route Parameter Injection (CVE-2026-44574)</title><link>https://feed.craftedsignal.io/briefs/2026-05-nextjs-middleware-bypass/</link><pubDate>Mon, 11 May 2026 15:56:36 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-nextjs-middleware-bypass/</guid><description>A vulnerability in Next.js (CVE-2026-44574) allows for authorization bypass in applications that use middleware to protect dynamic routes, enabling attackers to render protected content without proper authorization by crafting specific query parameters.</description><content:encoded><![CDATA[<p>A high-severity vulnerability, CVE-2026-44574, affects Next.js applications that rely on middleware for authorization of dynamic routes. This flaw allows attackers to bypass middleware checks by manipulating query parameters to alter the perceived route, granting access to protected content without proper authentication or authorization. This issue impacts Next.js versions 15.4.0 through 15.5.15 and 16.0.0 through 16.2.4. Successful exploitation leads to unauthorized access to sensitive data and functionalities within the affected application. Defenders should prioritize patching or implementing workarounds to mitigate the risk of exploitation.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a Next.js application using middleware for route protection.</li>
<li>The attacker discovers a dynamic route protected by middleware (e.g., <code>/dashboard/[id]</code>).</li>
<li>The attacker crafts a malicious URL containing manipulated query parameters designed to alter the dynamic route value. For example, <code>/dashboard/evil%2Fpath?param=value</code>.</li>
<li>The manipulated URL is sent to the Next.js application.</li>
<li>The application&rsquo;s routing logic incorrectly interprets the altered route value, bypassing the middleware check intended for the original route.</li>
<li>The application renders the protected content associated with the manipulated route.</li>
<li>The attacker gains unauthorized access to sensitive information or functionalities.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-44574 allows attackers to bypass authorization checks in Next.js applications that rely on middleware for route protection. This can lead to unauthorized access to sensitive data, such as user profiles, financial records, or confidential documents. The impact is highly dependent on the specific application and the data it handles. Organizations using vulnerable Next.js versions should consider the potential for data breaches and unauthorized access to critical functionalities.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Next.js to version 15.5.16 or later, or 16.2.5 or later, to remediate CVE-2026-44574.</li>
<li>If immediate upgrading is not possible, enforce authorization checks within the route or page logic itself, instead of relying solely on middleware path matching as recommended in the advisory.</li>
<li>Deploy the Sigma rule &ldquo;Detect CVE-2026-44574 Exploitation Attempt — Next.js Middleware Bypass&rdquo; to identify potential exploitation attempts in web server logs.</li>
<li>Monitor web server logs for suspicious URL patterns containing encoded characters or unusual query parameters targeting dynamic routes.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>nextjs</category><category>middleware</category><category>authorization</category><category>bypass</category><category>CVE-2026-44574</category><category>cloud</category></item></channel></rss>