Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-59471: Vulnerability in vercel next

0
Medium
VulnerabilityCVE-2025-59471cvecve-2025-59471
Published: Mon Jan 26 2026 (01/26/2026, 21:43:05 UTC)
Source: CVE Database V5
Vendor/Project: vercel
Product: next

Description

CVE-2025-59471 is a denial of service vulnerability affecting self-hosted Next. js applications using the Image Optimizer with remotePatterns configured for external domains. The vulnerability arises because the image optimization endpoint loads external images fully into memory without size limits, allowing attackers to cause out-of-memory conditions by requesting large images. Exploitation requires that remotePatterns allow external domains and that attackers control or serve large images from these domains. The vulnerability affects Next. js versions 10. 0 through 16. 0. No authentication or user interaction is needed, but the attack complexity is high due to the need to control large images on allowed domains. The CVSS score is 5.

AI-Powered Analysis

AILast updated: 02/03/2026, 08:43:44 UTC

Technical Analysis

CVE-2025-59471 is a denial of service (DoS) vulnerability in the Next.js framework's Image Optimizer feature when self-hosted and configured with remotePatterns to allow image optimization from external domains. The vulnerability stems from the image optimization endpoint (`/_next/image`) loading external images entirely into memory without enforcing a maximum size limit. This flaw allows an attacker to cause out-of-memory conditions by requesting the optimization of arbitrarily large images hosted on domains permitted by the remotePatterns configuration. Exploitation requires that the application’s remotePatterns setting includes external domains and that the attacker can serve or control large images on those domains. The vulnerability affects Next.js versions 10.0 through 16.0. The attack vector is network-based, requires no privileges or user interaction, but has high attack complexity due to the need to control large images on allowed domains. The impact is limited to availability, causing denial of service by exhausting server memory resources. No known exploits are currently in the wild. The recommended mitigation is to upgrade to Next.js versions 15.5.10 or 16.1.5, which implement protections against this memory exhaustion issue. This vulnerability is classified under CWE-400 (Uncontrolled Resource Consumption).

Potential Impact

For European organizations, this vulnerability poses a risk of denial of service, potentially causing web application outages or degraded performance for services relying on self-hosted Next.js with the Image Optimizer configured to fetch images from external domains. This can disrupt business operations, customer access, and damage reputation. Organizations with high traffic or those serving large volumes of image content are particularly vulnerable to resource exhaustion attacks. The impact is availability-focused, with no direct compromise of confidentiality or integrity. Given the medium CVSS score and the requirement for specific configuration and attacker capabilities, the risk is moderate but significant for critical web services. Disruptions could affect e-commerce platforms, media sites, and any web services relying on Next.js image optimization, especially if no mitigations are applied.

Mitigation Recommendations

1. Upgrade Next.js to version 15.5.10 or 16.1.5 or later, which include fixes to enforce maximum image size limits and prevent memory exhaustion. 2. Review and restrict the remotePatterns configuration to only trusted and necessary external domains to minimize exposure. 3. Implement network-level protections such as rate limiting and request size limits on the image optimization endpoint to reduce the risk of abuse. 4. Monitor application logs and resource usage for unusual spikes in memory consumption or image optimization requests. 5. Consider deploying Web Application Firewalls (WAFs) with custom rules to detect and block requests for unusually large images or suspicious patterns targeting the image optimizer endpoint. 6. Educate development and operations teams about the risks of overly permissive remotePatterns configurations and enforce secure coding and deployment practices.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
hackerone
Date Reserved
2025-09-16T15:00:07.876Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6977e1c04623b1157cbdb69d

Added to database: 1/26/2026, 9:50:56 PM

Last enriched: 2/3/2026, 8:43:44 AM

Last updated: 2/7/2026, 12:30:02 PM

Views: 117

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats