Skip to content

Commit c6cd72d

Browse files
committed
update
1 parent 5329b8a commit c6cd72d

File tree

1 file changed

+5
-1
lines changed

1 file changed

+5
-1
lines changed

src/content/changelog/workers/2025-03-22-next-js-vulnerability-waf.mdx

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,4 +11,8 @@ date: 2025-03-22T13:00:00Z
1111

1212
We've deployed a WAF (Web Application Firewall) rule to all sites to protect against the [Next.js authentication bypass vulnerability](https://github.com/advisories/GHSA-f82v-jwr5-mffw) (`CVE-2025-29927`) published on March 21st, 2025.
1313

14-
TODO
14+
This rule is automatically deployed to all sitesas part of our [WAF Managed Ruleset](/waf/managed-rules/reference/cloudflare-managed-ruleset/) and blocks requests that attempt to bypass authentication in Next.js applications.
15+
16+
The vulnerability affects almost all Next.js versions, and is patched in Next.js `14.2.25` and `15..2.3`. **Users on older versions of Next.js (`11.1.4` to `13.5.6`) do not have a patch available**.
17+
18+
The managed WAF rule mitigates this by blocking _external_ user requests with the `x-middleware-subrequest` header regardless of Next.js version, but we recommend users using Next.js 14 and 15 upgrade to the patched versions of Next.js as an additional mitigation.

0 commit comments

Comments
 (0)