Categories: Cyber Security News

Critical Next.js Vulnerability Exposes Cloud Credentials, API keys, and Admin Panels

A high-severity vulnerability in Next.js threatens self-hosted web applications with severe data breaches.

Threat actors can now exploit a Server-Side Request Forgery (SSRF) flaw to silently steal cloud credentials, harvest API keys, and access sensitive internal admin panels.

Organizations running self-hosted Next.js environments must patch immediately to prevent attackers from pivoting into their internal networks.

Next.js Flaw Exposes Credentials

The vulnerability, tracked as CVE-2026-44578, originates in how the built-in Next.js Node.js server handles WebSocket upgrade requests.

Attackers can send specially crafted WebSocket requests that trick the server into acting as a proxy. This forces the server to forward malicious requests to arbitrary internal or external destinations.

Because the server itself executes the request, it bypasses external firewalls. Attackers can use this trusted position to query internal network services, access unprotected admin dashboards, or reach cloud metadata endpoints.

Cloud metadata endpoints are particularly valuable targets because they often store temporary IAM credentials, API tokens, and deployment secrets.

This SSRF vulnerability strictly impacts self-hosted Next.js applications relying on the default Node.js server.

If your application runs on Vercel, you remain completely safe from this exploit. The Vercel infrastructure does not utilize the vulnerable WebSocket routing implementation.

If you manage your own infrastructure, you must verify your Next.js version. The flaw affects two distinct release tracks in the Next.js ecosystem.

The Next.js maintenance team has released security patches that apply strict safety checks to WebSocket upgrade handling.

The server now only proxies upgrade requests when routing configurations explicitly mark them as safe external rewrites.

Tim Neutkens disclosed GHSA-c4j6-fc7j-m34r on GitHub, advising developers to upgrade to Next.js 15.5.16 or 16.2.5 immediately. Where patching isn’t possible, network-level protections are recommended.

Administrators should configure reverse proxies or load balancers to block all WebSocket upgrade requests if the application does not actively use them.

Additionally, security teams must restrict the origin server’s outbound traffic, completely blocking access to internal cloud metadata services and unrelated internal networks.

Follow us on Google NewsLinkedIn, and X to Get More Instant Updates.

The post Critical Next.js Vulnerability Exposes Cloud Credentials, API keys, and Admin Panels appeared first on Cyber Security News.

rssfeeds-admin

Recent Posts

Peter Jackson Compares The Lord of the Rings: The Hunt for Gollum to Joaquin Phoenix’s Joker: ‘You Have to Get Inside His Head’

Peter Jackson has compared The Lord of the Rings: The Hunt for Gollum to Joaquin…

34 minutes ago

Shang-Chi Actor Tony Leung Says He ‘Argued With the Director’ About the Film Just Copying ‘Typical Kung Fu in the ’70s’

Shang-Chi and the Legend of the Ten Rings star Tony Leung says he learnt quickly…

34 minutes ago

Sustainable AI and Making Tech Work For Students

Every school year, a worrying number of students slip from “slightly behind” to “at risk,”…

2 hours ago

Chromie Health Emerges with Backing from AIX Ventures to Solve Nursing Staffing Headaches with AI

In 2024, Douglas Ford found himself in a position no one wants to be in:…

2 hours ago

What Is AI in Marketing and How Does It Actually Work?

Marketing has never moved this fast. The brands pulling ahead are not doing it with…

2 hours ago

Sustainable AI and Making Tech Work For Students

Every school year, a worrying number of students slip from “slightly behind” to “at risk,”…

2 hours ago

This website uses cookies.