Skip to content

Commit dc9e789

Browse files
penalosaworkers-devprodirvinebroque
authored andcommitted
Mitigations put in place for SSRF in @opennextjs/cloudflare (cloudflare#23068)
* Open next changelog * Update src/content/changelog/workers/2025-06-17-open-next-ssrf.mdx Co-authored-by: Brendan Irvine-Broque <[email protected]> * updates * updates --------- Co-authored-by: ANT Bot <[email protected]> Co-authored-by: Brendan Irvine-Broque <[email protected]>
1 parent 1468c5d commit dc9e789

File tree

1 file changed

+33
-0
lines changed

1 file changed

+33
-0
lines changed
Lines changed: 33 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,33 @@
1+
---
2+
title: SSRF vulnerability in @opennextjs/cloudflare proactively mitigated for all Cloudflare customers
3+
description: Mitigations have been put in place for all existing and future deployments of sites with the Cloudflare adapter for Open Next in response to an identified Server-Side Request Forgery (SSRF) vulnerability in the @opennextjs/cloudflare package
4+
products:
5+
- workers
6+
date: 2025-06-17T01:00:00Z
7+
---
8+
9+
Mitigations have been put in place for all existing and future deployments of sites with the Cloudflare adapter for Open Next in response to an identified Server-Side Request Forgery (SSRF) vulnerability in the `@opennextjs/cloudflare` package.
10+
11+
The vulnerability stemmed from an unimplemented feature in the Cloudflare adapter for Open Next, which allowed users to proxy arbitrary remote content via the `/_next/image` endpoint.
12+
13+
This issue allowed attackers to load remote resources from arbitrary hosts under the victim site's domain for any site deployed using the Cloudflare adapter for Open Next. For example: `https://victim-site.com/_next/image?url=https://attacker.com`. In this example, attacker-controlled content from `attacker.com` is served through the victim site's domain (`victim-site.com`), violating the same-origin policy and potentially misleading users or other services.
14+
15+
References: https://www.cve.org/cverecord?id=CVE-2025-6087, https://github.com/opennextjs/opennextjs-cloudflare/security/advisories/GHSA-rvpw-p7vw-wj3m
16+
17+
## Impact
18+
19+
- SSRF via unrestricted remote URL loading
20+
- Arbitrary remote content loading
21+
- Potential internal service exposure or phishing risks through domain abuse
22+
23+
## Mitigation
24+
25+
The following mitigations have been put in place:
26+
27+
**Server side updates** to Cloudflare's platform to restrict the content loaded via the `/_next/image` endpoint to images. The update automatically mitigates the issue for all existing and any future sites deployed to Cloudflare using the affected version of the Cloudflare adapter for Open Next
28+
29+
**Root cause fix:** Pull request [#727](https://github.com/opennextjs/opennextjs-cloudflare/pull/727) to the Cloudflare adapter for Open Next. The patched version of the adapter has been released as `@opennextjs/[email protected]`
30+
31+
**Package dependency update:** Pull request [cloudflare/workers-sdk#9608](https://github.com/cloudflare/workers-sdk/pull/9608) to create-cloudflare (c3) to use the fixed version of the Cloudflare adapter for Open Next. The patched version of create-cloudflare has been published as `[email protected]`.
32+
33+
In addition to the automatic mitigation deployed on Cloudflare's platform, we encourage affected users to upgrade to `@opennext/cloudflare` v1.3.0 and use the [`remotePatterns`](https://nextjs.org/docs/pages/api-reference/components/image#remotepatterns) filter in Next config if they need to allow-list external urls with images assets.

0 commit comments

Comments
 (0)