In next dev, cross-site protection for internal websocket endpoints could treat Origin: null as a bypass case even if allowedDevOrigins is configured, allowing privacy-sensitive/opaque contexts (for example sandboxed documents) to connect unexpectedly.
If a dev server is reachable from attacker-controlled content, an attacker may be able to connect to the HMR websocket channel and interact with dev websocket traffic. This affects development mode only.
Apps without a configured allowedDevOrigins still allow connections from any origin.
Fixed by validating Origin: null through the same cross-site origin-allowance checks used for other origins.
If upgrade is not immediately possible:
- Do not expose next dev to untrusted networks.
- Block websocket upgrades to /_next/webpack-hmr when Origin is null at your proxy.
{
"github_reviewed": true,
"cwe_ids": [
"CWE-1385"
],
"severity": "LOW",
"github_reviewed_at": "2026-03-17T15:29:48Z",
"nvd_published_at": null
}