GHSA-492v-c6pp-mqqv

Suggest an improvement
Source
https://github.com/advisories/GHSA-492v-c6pp-mqqv
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/05/GHSA-492v-c6pp-mqqv/GHSA-492v-c6pp-mqqv.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-492v-c6pp-mqqv
Aliases
  • CVE-2026-44574
Published
2026-05-11T15:54:08Z
Modified
2026-05-11T16:04:40.277432Z
Severity
  • 8.1 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N CVSS Calculator
Summary
Next.js has a Middleware / Proxy bypass through dynamic route parameter injection
Details

Impact

Applications that rely on middleware to protect dynamic routes can be vulnerable to authorization bypass. In affected deployments, specially crafted query parameters can alter the dynamic route value seen by the page while leaving the visible path unchanged, which can allow protected content to be rendered without passing the expected middleware check.

Fix

We now only honor internal route-parameter normalization in trusted routing flows and ignore externally supplied parameter encodings that should never have been accepted from ordinary requests.

Workarounds

If you cannot upgrade immediately, enforce authorization in route or page logic instead of relying solely on middleware path matching.

Database specific
{
    "github_reviewed": true,
    "github_reviewed_at": "2026-05-11T15:54:08Z",
    "cwe_ids": [
        "CWE-288"
    ],
    "severity": "HIGH",
    "nvd_published_at": null
}
References

Affected packages

npm / next

Package

Affected ranges

Type
SEMVER
Events
Introduced
15.4.0
Fixed
15.5.16

Database specific

source
"https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/05/GHSA-492v-c6pp-mqqv/GHSA-492v-c6pp-mqqv.json"

npm / next

Package

Affected ranges

Type
SEMVER
Events
Introduced
16.0.0
Fixed
16.2.5

Database specific

source
"https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/05/GHSA-492v-c6pp-mqqv/GHSA-492v-c6pp-mqqv.json"