App Router applications that rely on CSP nonces can be vulnerable to stored cross-site scripting when deployed behind shared caches. In affected versions, malformed nonce values derived from request headers could be reflected into rendered HTML in an unsafe way, allowing an attacker to poison cached responses and cause script execution for later visitors.
We now reject or ignore malformed nonce values before they are embedded into HTML and apply stricter nonce sanitization so request-derived nonce data cannot break out of the intended attribute context.
If you cannot upgrade immediately, strip inbound Content-Security-Policy request headers from untrusted traffic.
{
"github_reviewed": true,
"github_reviewed_at": "2026-05-11T15:57:12Z",
"nvd_published_at": null,
"severity": "MODERATE",
"cwe_ids": [
"CWE-79"
]
}