CVE-2025-59471: Vulnerability in vercel next
CVE-2025-59471 is a denial of service vulnerability affecting self-hosted Next. js applications using the Image Optimizer with remotePatterns configured for external domains. The vulnerability arises because the image optimization endpoint loads external images fully into memory without size limits, allowing attackers to cause out-of-memory conditions by requesting large images. Exploitation requires that remotePatterns allow external domains and that attackers control or serve large images from these domains. The vulnerability affects Next. js versions 10. 0 through 16. 0. No authentication or user interaction is needed, but the attack complexity is high due to the need to control large images on allowed domains. The CVSS score is 5.
AI Analysis
Technical Summary
CVE-2025-59471 is a denial of service (DoS) vulnerability in the Next.js framework's Image Optimizer feature when self-hosted and configured with remotePatterns to allow image optimization from external domains. The vulnerability stems from the image optimization endpoint (`/_next/image`) loading external images entirely into memory without enforcing a maximum size limit. This flaw allows an attacker to cause out-of-memory conditions by requesting the optimization of arbitrarily large images hosted on domains permitted by the remotePatterns configuration. Exploitation requires that the application’s remotePatterns setting includes external domains and that the attacker can serve or control large images on those domains. The vulnerability affects Next.js versions 10.0 through 16.0. The attack vector is network-based, requires no privileges or user interaction, but has high attack complexity due to the need to control large images on allowed domains. The impact is limited to availability, causing denial of service by exhausting server memory resources. No known exploits are currently in the wild. The recommended mitigation is to upgrade to Next.js versions 15.5.10 or 16.1.5, which implement protections against this memory exhaustion issue. This vulnerability is classified under CWE-400 (Uncontrolled Resource Consumption).
Potential Impact
For European organizations, this vulnerability poses a risk of denial of service, potentially causing web application outages or degraded performance for services relying on self-hosted Next.js with the Image Optimizer configured to fetch images from external domains. This can disrupt business operations, customer access, and damage reputation. Organizations with high traffic or those serving large volumes of image content are particularly vulnerable to resource exhaustion attacks. The impact is availability-focused, with no direct compromise of confidentiality or integrity. Given the medium CVSS score and the requirement for specific configuration and attacker capabilities, the risk is moderate but significant for critical web services. Disruptions could affect e-commerce platforms, media sites, and any web services relying on Next.js image optimization, especially if no mitigations are applied.
Mitigation Recommendations
1. Upgrade Next.js to version 15.5.10 or 16.1.5 or later, which include fixes to enforce maximum image size limits and prevent memory exhaustion. 2. Review and restrict the remotePatterns configuration to only trusted and necessary external domains to minimize exposure. 3. Implement network-level protections such as rate limiting and request size limits on the image optimization endpoint to reduce the risk of abuse. 4. Monitor application logs and resource usage for unusual spikes in memory consumption or image optimization requests. 5. Consider deploying Web Application Firewalls (WAFs) with custom rules to detect and block requests for unusually large images or suspicious patterns targeting the image optimizer endpoint. 6. Educate development and operations teams about the risks of overly permissive remotePatterns configurations and enforce secure coding and deployment practices.
Affected Countries
Germany, United Kingdom, France, Netherlands, Sweden, Ireland
CVE-2025-59471: Vulnerability in vercel next
Description
CVE-2025-59471 is a denial of service vulnerability affecting self-hosted Next. js applications using the Image Optimizer with remotePatterns configured for external domains. The vulnerability arises because the image optimization endpoint loads external images fully into memory without size limits, allowing attackers to cause out-of-memory conditions by requesting large images. Exploitation requires that remotePatterns allow external domains and that attackers control or serve large images from these domains. The vulnerability affects Next. js versions 10. 0 through 16. 0. No authentication or user interaction is needed, but the attack complexity is high due to the need to control large images on allowed domains. The CVSS score is 5.
AI-Powered Analysis
Technical Analysis
CVE-2025-59471 is a denial of service (DoS) vulnerability in the Next.js framework's Image Optimizer feature when self-hosted and configured with remotePatterns to allow image optimization from external domains. The vulnerability stems from the image optimization endpoint (`/_next/image`) loading external images entirely into memory without enforcing a maximum size limit. This flaw allows an attacker to cause out-of-memory conditions by requesting the optimization of arbitrarily large images hosted on domains permitted by the remotePatterns configuration. Exploitation requires that the application’s remotePatterns setting includes external domains and that the attacker can serve or control large images on those domains. The vulnerability affects Next.js versions 10.0 through 16.0. The attack vector is network-based, requires no privileges or user interaction, but has high attack complexity due to the need to control large images on allowed domains. The impact is limited to availability, causing denial of service by exhausting server memory resources. No known exploits are currently in the wild. The recommended mitigation is to upgrade to Next.js versions 15.5.10 or 16.1.5, which implement protections against this memory exhaustion issue. This vulnerability is classified under CWE-400 (Uncontrolled Resource Consumption).
Potential Impact
For European organizations, this vulnerability poses a risk of denial of service, potentially causing web application outages or degraded performance for services relying on self-hosted Next.js with the Image Optimizer configured to fetch images from external domains. This can disrupt business operations, customer access, and damage reputation. Organizations with high traffic or those serving large volumes of image content are particularly vulnerable to resource exhaustion attacks. The impact is availability-focused, with no direct compromise of confidentiality or integrity. Given the medium CVSS score and the requirement for specific configuration and attacker capabilities, the risk is moderate but significant for critical web services. Disruptions could affect e-commerce platforms, media sites, and any web services relying on Next.js image optimization, especially if no mitigations are applied.
Mitigation Recommendations
1. Upgrade Next.js to version 15.5.10 or 16.1.5 or later, which include fixes to enforce maximum image size limits and prevent memory exhaustion. 2. Review and restrict the remotePatterns configuration to only trusted and necessary external domains to minimize exposure. 3. Implement network-level protections such as rate limiting and request size limits on the image optimization endpoint to reduce the risk of abuse. 4. Monitor application logs and resource usage for unusual spikes in memory consumption or image optimization requests. 5. Consider deploying Web Application Firewalls (WAFs) with custom rules to detect and block requests for unusually large images or suspicious patterns targeting the image optimizer endpoint. 6. Educate development and operations teams about the risks of overly permissive remotePatterns configurations and enforce secure coding and deployment practices.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- hackerone
- Date Reserved
- 2025-09-16T15:00:07.876Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6977e1c04623b1157cbdb69d
Added to database: 1/26/2026, 9:50:56 PM
Last enriched: 2/3/2026, 8:43:44 AM
Last updated: 2/7/2026, 12:30:02 PM
Views: 117
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2085: Command Injection in D-Link DWR-M921
HighCVE-2026-2084: OS Command Injection in D-Link DIR-823X
HighCVE-2026-2083: SQL Injection in code-projects Social Networking Site
MediumCVE-2026-2082: OS Command Injection in D-Link DIR-823X
MediumCVE-2026-2080: Command Injection in UTT HiPER 810
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.