The image optimization feature of Next.js contained a vulnerability which allowed for a potential Denial of Service (DoS) condition which could lead to excessive CPU consumption.
Not affected:
- The next.config.js
file is configured with images.unoptimized
set to true
or images.loader
set to a non-default value.
- The Next.js application is hosted on Vercel.
This issue was fully patched in Next.js 14.2.7
. We recommend that users upgrade to at least this version.
Ensure that the next.config.js
file has either images.unoptimized
, images.loader
or images.loaderFile
assigned.
Brandon Dahler (brandondahler), AWS Dimitrios Vlastaras
{ "nvd_published_at": "2024-10-14T18:15:05Z", "cwe_ids": [ "CWE-674" ], "severity": "MODERATE", "github_reviewed": true, "github_reviewed_at": "2024-10-14T19:45:21Z" }