diff --git a/advisories/github-reviewed/2025/03/GHSA-f82v-jwr5-mffw/GHSA-f82v-jwr5-mffw.json b/advisories/github-reviewed/2025/03/GHSA-f82v-jwr5-mffw/GHSA-f82v-jwr5-mffw.json index eb249c46e3d88..82a495fa03509 100644 --- a/advisories/github-reviewed/2025/03/GHSA-f82v-jwr5-mffw/GHSA-f82v-jwr5-mffw.json +++ b/advisories/github-reviewed/2025/03/GHSA-f82v-jwr5-mffw/GHSA-f82v-jwr5-mffw.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-f82v-jwr5-mffw", - "modified": "2025-10-13T15:32:07Z", + "modified": "2025-10-13T15:32:09Z", "published": "2025-03-21T15:20:12Z", "aliases": [ "CVE-2025-29927" @@ -10,8 +10,8 @@ "details": "# Impact\nIt is possible to bypass authorization checks within a Next.js application, if the authorization check occurs in middleware.\n\n# Patches\n* For Next.js 15.x, this issue is fixed in `15.2.3`\n* For Next.js 14.x, this issue is fixed in `14.2.25`\n* For Next.js 13.x, this issue is fixed in 13.5.9\n* For Next.js 12.x, this issue is fixed in 12.3.5\n* For Next.js 11.x, consult the below workaround.\n\n_Note: Next.js deployments hosted on Vercel are automatically protected against this vulnerability._\n\n# Workaround\nIf patching to a safe version is infeasible, we recommend that you prevent external user requests which contain the `x-middleware-subrequest` header from reaching your Next.js application.\n\n## Credits\n\n- Allam Rachid (zhero;)\n- Allam Yasser (inzo_)", "severity": [ { - "type": "CVSS_V3", - "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:P/AC:H/AT:P/PR:H/UI:A/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" } ], "affected": [ @@ -143,7 +143,7 @@ "CWE-285", "CWE-863" ], - "severity": "CRITICAL", + "severity": "LOW", "github_reviewed": true, "github_reviewed_at": "2025-03-21T15:20:12Z", "nvd_published_at": "2025-03-21T15:15:42Z"