CVE-2025-30218: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in vercel next.js
Next.js is a React framework for building full-stack web applications. To mitigate CVE-2025-29927, Next.js validated the x-middleware-subrequest-id which persisted across multiple incoming requests. However, this subrequest ID is sent to all requests, even if the destination is not the same host as the Next.js application. Initiating a fetch request to a third-party within Middleware will send the x-middleware-subrequest-id to that third party. This vulnerability is fixed in 12.3.6, 13.5.10, 14.2.26, and 15.2.4.
AI Analysis
Technical Summary
CVE-2025-30218 is a vulnerability classified under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor) affecting the Next.js framework by Vercel. Next.js uses an internal header, x-middleware-subrequest-id, to track subrequests within its middleware processing pipeline. To address a previous vulnerability (CVE-2025-29927), Next.js implemented validation of this header to ensure it persisted only across legitimate internal requests. However, the vulnerability arises because this header is indiscriminately sent with all fetch requests initiated within middleware, including those targeting third-party hosts outside the Next.js application domain. Consequently, sensitive internal identifiers meant for internal tracking can be leaked to external, potentially untrusted parties. The affected Next.js versions are 12.3.5, 13.5.9, 14.2.25, and 15.2.3. The issue is fixed in versions 12.3.6, 13.5.10, 14.2.26, and 15.2.4. The CVSS 4.0 base score is 1.7, indicating low severity, primarily because the exposed information is limited to a request identifier, exploitation requires network access to trigger middleware fetches, and no authentication or user interaction is needed. No known exploits have been reported in the wild. This vulnerability can lead to unauthorized disclosure of internal request tracking data, which might aid attackers in reconnaissance or correlation of requests but does not directly compromise system integrity or availability.
Potential Impact
For European organizations, the impact of CVE-2025-30218 is primarily related to confidentiality. Leakage of the x-middleware-subrequest-id to third-party services could allow attackers or external entities to correlate internal request flows or gain insight into application behavior. While this does not directly lead to system compromise or data manipulation, it can weaken privacy guarantees and potentially assist in more sophisticated attacks such as session correlation or traffic analysis. Organizations heavily reliant on Next.js for their web applications, especially those integrating multiple third-party services via middleware fetch calls, are at risk of inadvertently exposing internal identifiers. This could be particularly concerning for sectors handling sensitive user data, such as finance, healthcare, or government services. However, the low CVSS score and absence of known exploits suggest the immediate risk is limited. Still, failure to address this vulnerability could erode user trust and compliance with data protection regulations like GDPR if sensitive information is leaked externally.
Mitigation Recommendations
The primary mitigation is to upgrade all affected Next.js instances to the patched versions: 12.3.6, 13.5.10, 14.2.26, or 15.2.4, depending on the version in use. Beyond upgrading, organizations should audit their middleware fetch requests to third-party domains to ensure no sensitive headers or internal identifiers are unintentionally forwarded. Implement strict header filtering or sanitization in middleware to prevent leakage of internal tracking headers to external services. Additionally, review third-party integrations to assess the necessity and security posture of external endpoints receiving requests from middleware. Employ network monitoring to detect unusual outbound requests carrying internal headers. Finally, incorporate this vulnerability into regular security assessments and developer training to raise awareness about secure middleware practices in Next.js applications.
Affected Countries
United Kingdom, Germany, France, Netherlands, Sweden, Ireland
CVE-2025-30218: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in vercel next.js
Description
Next.js is a React framework for building full-stack web applications. To mitigate CVE-2025-29927, Next.js validated the x-middleware-subrequest-id which persisted across multiple incoming requests. However, this subrequest ID is sent to all requests, even if the destination is not the same host as the Next.js application. Initiating a fetch request to a third-party within Middleware will send the x-middleware-subrequest-id to that third party. This vulnerability is fixed in 12.3.6, 13.5.10, 14.2.26, and 15.2.4.
AI-Powered Analysis
Technical Analysis
CVE-2025-30218 is a vulnerability classified under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor) affecting the Next.js framework by Vercel. Next.js uses an internal header, x-middleware-subrequest-id, to track subrequests within its middleware processing pipeline. To address a previous vulnerability (CVE-2025-29927), Next.js implemented validation of this header to ensure it persisted only across legitimate internal requests. However, the vulnerability arises because this header is indiscriminately sent with all fetch requests initiated within middleware, including those targeting third-party hosts outside the Next.js application domain. Consequently, sensitive internal identifiers meant for internal tracking can be leaked to external, potentially untrusted parties. The affected Next.js versions are 12.3.5, 13.5.9, 14.2.25, and 15.2.3. The issue is fixed in versions 12.3.6, 13.5.10, 14.2.26, and 15.2.4. The CVSS 4.0 base score is 1.7, indicating low severity, primarily because the exposed information is limited to a request identifier, exploitation requires network access to trigger middleware fetches, and no authentication or user interaction is needed. No known exploits have been reported in the wild. This vulnerability can lead to unauthorized disclosure of internal request tracking data, which might aid attackers in reconnaissance or correlation of requests but does not directly compromise system integrity or availability.
Potential Impact
For European organizations, the impact of CVE-2025-30218 is primarily related to confidentiality. Leakage of the x-middleware-subrequest-id to third-party services could allow attackers or external entities to correlate internal request flows or gain insight into application behavior. While this does not directly lead to system compromise or data manipulation, it can weaken privacy guarantees and potentially assist in more sophisticated attacks such as session correlation or traffic analysis. Organizations heavily reliant on Next.js for their web applications, especially those integrating multiple third-party services via middleware fetch calls, are at risk of inadvertently exposing internal identifiers. This could be particularly concerning for sectors handling sensitive user data, such as finance, healthcare, or government services. However, the low CVSS score and absence of known exploits suggest the immediate risk is limited. Still, failure to address this vulnerability could erode user trust and compliance with data protection regulations like GDPR if sensitive information is leaked externally.
Mitigation Recommendations
The primary mitigation is to upgrade all affected Next.js instances to the patched versions: 12.3.6, 13.5.10, 14.2.26, or 15.2.4, depending on the version in use. Beyond upgrading, organizations should audit their middleware fetch requests to third-party domains to ensure no sensitive headers or internal identifiers are unintentionally forwarded. Implement strict header filtering or sanitization in middleware to prevent leakage of internal tracking headers to external services. Additionally, review third-party integrations to assess the necessity and security posture of external endpoints receiving requests from middleware. Employ network monitoring to detect unusual outbound requests carrying internal headers. Finally, incorporate this vulnerability into regular security assessments and developer training to raise awareness about secure middleware practices in Next.js applications.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-03-18T18:15:13.850Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68ed1ec2e2beed89262b47a4
Added to database: 10/13/2025, 3:46:10 PM
Last enriched: 10/13/2025, 3:58:57 PM
Last updated: 10/14/2025, 9:47:50 AM
Views: 8
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2024-54678: CWE-502: Deserialization of Untrusted Data in Siemens SIMATIC PCS neo V4.1
HighCVE-2024-33698: CWE-122: Heap-based Buffer Overflow in Siemens Opcenter Quality
CriticalCVE-2023-52236: CWE-327: Use of a Broken or Risky Cryptographic Algorithm in Siemens RUGGEDCOM i800
HighCVE-2025-40812: CWE-125: Out-of-bounds Read in Siemens Solid Edge SE2024
HighCVE-2025-40811: CWE-125: Out-of-bounds Read in Siemens Solid Edge SE2024
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.