Skip to content

Commit 792f94d

Browse files
committed
fix image
1 parent d36a2ca commit 792f94d

File tree

1 file changed

+4
-1
lines changed

1 file changed

+4
-1
lines changed

src/content/changelog/workers/2025-03-22-next-js-vulnerability-waf.mdx

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,6 +9,9 @@ products:
99
date: 2025-03-22T13:00:00Z
1010
---
1111

12+
import { Image } from 'astro:assets';
13+
import managedRuleNextJsAuth from "~/assets/images/changelog/workers/high-res-CVE-2025-29927.gif"
14+
1215
**Update**: We have changed this WAF rule to opt-in only, as sites that use auth middleware with third-party auth vendors were observing failing requests.
1316

1417
**We strongly recommend updating your version of Next.js (if eligible)** to the patched versions, as your app will otherwise be vulnerable to an authentication bypass attack regardless of auth provider.
@@ -27,7 +30,7 @@ To enable the rule:
2730
6. Click **Next**
2831
7. Scroll down and choose **Save**
2932

30-
![Next.js CVE-2025-29927 WAF rule](src/assets/images/changelog/workers/high-res-CVE-2025-29927.gif)
33+
<Image src={managedRuleNextJsAuth} alt="Enable the CVE-2025-29927 rule" width="1280" height="1039" />
3134

3235
This will enable the WAF rule and block requests with the `x-middleware-subrequest` header regardless of Next.js version.
3336

0 commit comments

Comments
 (0)