<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2026-44578 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-44578/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 11 May 2026 15:56:10 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-44578/feed.xml" rel="self" type="application/rss+xml"/><item><title>Next.js SSRF Vulnerability via WebSocket Upgrade Requests (CVE-2026-44578)</title><link>https://feed.craftedsignal.io/briefs/2026-05-nextjs-ssrf/</link><pubDate>Mon, 11 May 2026 15:56:10 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-nextjs-ssrf/</guid><description>Next.js applications using WebSocket upgrades are vulnerable to server-side request forgery (SSRF) through crafted WebSocket upgrade requests, allowing attackers to proxy requests to internal or external destinations, affecting self-hosted applications running versions npm/next (&gt;= 13.4.13, &lt; 15.5.16) and npm/next (&gt;= 16.0.0, &lt; 16.2.5).</description><content:encoded><![CDATA[<p>Next.js applications utilizing WebSocket upgrades are susceptible to a server-side request forgery (SSRF) vulnerability. This flaw allows an attacker to craft WebSocket upgrade requests, forcing the server to proxy requests to arbitrary internal or external destinations. This vulnerability is present in self-hosted Next.js applications using the built-in Node.js server. Vercel-hosted deployments are not affected. The vulnerability is present in versions npm/next (&gt;= 13.4.13, &lt; 15.5.16) and npm/next (&gt;= 16.0.0, &lt; 16.2.5). The fix involves applying the same safety checks to WebSocket upgrade handling that already existed for normal HTTP requests, ensuring upgrade requests are only proxied when routing has explicitly marked them as safe external rewrites. This issue is tracked as CVE-2026-44578.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a self-hosted Next.js application utilizing WebSocket upgrades.</li>
<li>The attacker crafts a malicious WebSocket upgrade request. This request contains a target destination (internal or external) to which the server will be forced to proxy the request.</li>
<li>The attacker sends the crafted WebSocket upgrade request to the Next.js server.</li>
<li>The Next.js server, lacking proper validation, processes the malicious upgrade request.</li>
<li>The server initiates a connection to the attacker-specified destination.</li>
<li>The server proxies data between the attacker and the target destination.</li>
<li>The attacker gains access to internal services, cloud metadata endpoints, or other sensitive resources.</li>
<li>The attacker exfiltrates sensitive information or leverages the access for further malicious activities.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SSRF vulnerability (CVE-2026-44578) can lead to the exposure of internal services, cloud metadata endpoints, or other sensitive resources. Attackers can potentially gain unauthorized access to sensitive data or internal systems, leading to data breaches, privilege escalation, or further compromise of the affected infrastructure. The number of victims and the specific sectors targeted depend on the deployment and configurations of the vulnerable Next.js applications. Vercel-hosted deployments are not affected.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Next.js to a patched version (&gt;= 15.5.16 or &gt;= 16.2.5) to remediate the vulnerability as described in GHSA-c4j6-fc7j-m34r.</li>
<li>Deploy the Sigma rule <code>Detect Suspicious WebSocket Upgrade Requests</code> to detect potential exploitation attempts by monitoring for suspicious target domains in WebSocket upgrade requests.</li>
<li>If immediate upgrade is not possible, implement the suggested workarounds: do not expose the origin server directly to untrusted networks and block WebSocket upgrades at the reverse proxy or load balancer if they are not required, as described in GHSA-c4j6-fc7j-m34r.</li>
<li>Restrict origin egress to internal networks and metadata services where possible, as recommended in GHSA-c4j6-fc7j-m34r.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>ssrf</category><category>cve-2026-44578</category><category>next.js</category><category>websocket</category><category>server-side request forgery</category></item></channel></rss>