Automated security scanners flag SQL injection on /_next/static chunk URLs – confirmation of expected behavior #87305
Unanswered
georgepolygon
asked this question in
App Router
Replies: 1 comment
-
|
Assets in the _next/static/chunks/*.js folder are not invoked by user input at runtime. They are referenced by the application’s HTML entry points and fetched by the browser exactly as built. Modifying the URL manually (including adding query parameters or payloads) does not change how the asset is served, interpreted, or executed by the browser. In fact, these are designed to be served from a CDN, totally decoupled from any server running business logic. This is a false positive, and you may skip audit checks for SQL injection on these assets. |
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
Next.js version
16.0.7
Description
During a security assessment, automated tools (Burp Suite) flagged potential SQL injection findings against URLs under
/_next/static/chunks/*.jsand similar static asset paths generated by Next.js.These endpoints serve prebuilt static JavaScript assets and do not involve server-side execution, request processing, or database interaction. The findings are based on payloads injected into the URL path of GET requests and appear to be false positives originating from static file delivery behavior.
Expected behavior
Static assets under
/_next/staticare served as immutable files and should not process user input or interact with backend services or databases.Clarification requested
Could you please confirm:
This confirmation is required for compliance and audit documentation.
Reproduction
No functional exploitation is possible. Findings are based solely on automated scanning of static asset URLs.
Beta Was this translation helpful? Give feedback.
All reactions