<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>CVE-2026-44574 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-44574/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 11 May 2026 15:56:36 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-44574/feed.xml" rel="self" type="application/rss+xml"/><item><title>Next.js Middleware Authorization Bypass via Dynamic Route Parameter Injection (CVE-2026-44574)</title><link>https://feed.craftedsignal.io/briefs/2026-05-nextjs-middleware-bypass/</link><pubDate>Mon, 11 May 2026 15:56:36 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-nextjs-middleware-bypass/</guid><description>A vulnerability in Next.js (CVE-2026-44574) allows for authorization bypass in applications that use middleware to protect dynamic routes, enabling attackers to render protected content without proper authorization by crafting specific query parameters.</description><content:encoded><![CDATA[<p>A high-severity vulnerability, CVE-2026-44574, affects Next.js applications that rely on middleware for authorization of dynamic routes. This flaw allows attackers to bypass middleware checks by manipulating query parameters to alter the perceived route, granting access to protected content without proper authentication or authorization. This issue impacts Next.js versions 15.4.0 through 15.5.15 and 16.0.0 through 16.2.4. Successful exploitation leads to unauthorized access to sensitive data and functionalities within the affected application. Defenders should prioritize patching or implementing workarounds to mitigate the risk of exploitation.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a Next.js application using middleware for route protection.</li>
<li>The attacker discovers a dynamic route protected by middleware (e.g., <code>/dashboard/[id]</code>).</li>
<li>The attacker crafts a malicious URL containing manipulated query parameters designed to alter the dynamic route value. For example, <code>/dashboard/evil%2Fpath?param=value</code>.</li>
<li>The manipulated URL is sent to the Next.js application.</li>
<li>The application&rsquo;s routing logic incorrectly interprets the altered route value, bypassing the middleware check intended for the original route.</li>
<li>The application renders the protected content associated with the manipulated route.</li>
<li>The attacker gains unauthorized access to sensitive information or functionalities.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-44574 allows attackers to bypass authorization checks in Next.js applications that rely on middleware for route protection. This can lead to unauthorized access to sensitive data, such as user profiles, financial records, or confidential documents. The impact is highly dependent on the specific application and the data it handles. Organizations using vulnerable Next.js versions should consider the potential for data breaches and unauthorized access to critical functionalities.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Next.js to version 15.5.16 or later, or 16.2.5 or later, to remediate CVE-2026-44574.</li>
<li>If immediate upgrading is not possible, enforce authorization checks within the route or page logic itself, instead of relying solely on middleware path matching as recommended in the advisory.</li>
<li>Deploy the Sigma rule &ldquo;Detect CVE-2026-44574 Exploitation Attempt — Next.js Middleware Bypass&rdquo; to identify potential exploitation attempts in web server logs.</li>
<li>Monitor web server logs for suspicious URL patterns containing encoded characters or unusual query parameters targeting dynamic routes.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>nextjs</category><category>middleware</category><category>authorization</category><category>bypass</category><category>CVE-2026-44574</category><category>cloud</category></item></channel></rss>