CVE-2025-59472: Vulnerability in vercel next
CVE-2025-59472 is a denial of service vulnerability in Vercel Next. js versions with Partial Prerendering (PPR) enabled and running in minimal mode. It allows unauthenticated attackers to send specially crafted POST requests with the 'Next-Resume: 1' header to the PPR resume endpoint, causing the server to exhaust memory and crash. The attack exploits two main issues: unbounded buffering of the request body and unbounded decompression of cached resume data, including a zipbomb-style payload. This leads to a fatal JavaScript heap out-of-memory error, terminating the Node. js process and causing application downtime. Exploitation requires the application to be configured with experimental. ppr or cacheComponents enabled and NEXT_PRIVATE_MINIMAL_MODE=1. The vulnerability has a CVSS score of 5. 9 (medium severity) and no known exploits in the wild.
AI Analysis
Technical Summary
CVE-2025-59472 is a denial of service (DoS) vulnerability affecting Vercel's Next.js framework, specifically versions from 15.0.0-canary.0 up to 16.1.0, when Partial Prerendering (PPR) is enabled via experimental.ppr or cacheComponents configuration and the environment variable NEXT_PRIVATE_MINIMAL_MODE=1 is set. The vulnerability arises in the PPR resume endpoint, which accepts unauthenticated POST requests containing the 'Next-Resume: 1' header. The server processes postponed state data sent by the client without proper validation or size restrictions. Two related flaws enable memory exhaustion attacks: (1) The server buffers the entire POST request body into memory using Buffer.concat() without imposing size limits, allowing attackers to send arbitrarily large payloads that consume all available memory. (2) The server decompresses cached resume data using inflateSync() without limiting the decompressed output size, enabling zipbomb-style attacks where a small compressed payload expands to hundreds of megabytes or gigabytes, overwhelming memory resources. Both attack vectors cause the Node.js process to crash with a fatal V8 out-of-memory error, resulting in denial of service and application downtime. The zipbomb variant is particularly dangerous because it can bypass reverse proxy request size limits, making traditional network-layer protections ineffective. Exploitation requires no authentication or user interaction, increasing the attack surface. The vulnerability is tracked under CWE-400 (Uncontrolled Resource Consumption). Although no known exploits are currently reported in the wild, the medium CVSS score (5.9) reflects the moderate complexity of exploitation and significant impact on availability. Mitigation involves upgrading to Next.js versions 15.6.0-canary.61 or 16.1.5, which include fixes to enforce request body size limits and decompression output restrictions, preventing memory exhaustion. Organizations should audit their Next.js configurations to identify use of PPR and minimal mode and apply patches promptly to avoid service disruptions.
Potential Impact
For European organizations, this vulnerability poses a significant risk to the availability of web applications built on vulnerable Next.js versions with Partial Prerendering enabled in minimal mode. Successful exploitation results in server crashes due to memory exhaustion, causing denial of service and potential downtime of critical web services. This can disrupt business operations, degrade user experience, and potentially lead to financial losses and reputational damage. Since the attack requires no authentication and can bypass reverse proxy request size limits via zipbomb payloads, traditional perimeter defenses may be insufficient. Organizations relying on Next.js for customer-facing websites, e-commerce platforms, or internal portals are particularly vulnerable. The impact is amplified in sectors with high web traffic or stringent uptime requirements, such as finance, healthcare, and government services. Additionally, the vulnerability could be exploited as part of larger distributed denial of service (DDoS) campaigns targeting European digital infrastructure. Although no data confidentiality or integrity is directly affected, the availability impact alone warrants urgent remediation to maintain service continuity and comply with regulatory requirements such as the EU NIS Directive.
Mitigation Recommendations
1. Upgrade Next.js to version 15.6.0-canary.61 or 16.1.5 or later, which include patches to limit request body buffering and decompression output size. 2. Audit application configurations to identify use of experimental.ppr or cacheComponents features and the NEXT_PRIVATE_MINIMAL_MODE=1 environment variable; disable these features if not strictly necessary. 3. Implement application-layer request size limits and decompression size limits where possible to prevent large payload processing. 4. Deploy Web Application Firewalls (WAFs) with custom rules to detect and block POST requests containing the 'Next-Resume: 1' header or suspiciously large payloads targeting the PPR resume endpoint. 5. Monitor server memory usage and Node.js process health to detect anomalous spikes indicative of exploitation attempts. 6. Use rate limiting on the PPR resume endpoint to reduce the risk of repeated exploitation attempts. 7. Conduct regular security testing and code reviews focusing on resource consumption vulnerabilities in server-side rendering features. 8. Coordinate with hosting providers or cloud platforms to apply network-level protections against zipbomb and large payload attacks. 9. Educate development teams about the risks of enabling experimental features in production environments without thorough security assessments.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain, Poland, Belgium, Ireland
CVE-2025-59472: Vulnerability in vercel next
Description
CVE-2025-59472 is a denial of service vulnerability in Vercel Next. js versions with Partial Prerendering (PPR) enabled and running in minimal mode. It allows unauthenticated attackers to send specially crafted POST requests with the 'Next-Resume: 1' header to the PPR resume endpoint, causing the server to exhaust memory and crash. The attack exploits two main issues: unbounded buffering of the request body and unbounded decompression of cached resume data, including a zipbomb-style payload. This leads to a fatal JavaScript heap out-of-memory error, terminating the Node. js process and causing application downtime. Exploitation requires the application to be configured with experimental. ppr or cacheComponents enabled and NEXT_PRIVATE_MINIMAL_MODE=1. The vulnerability has a CVSS score of 5. 9 (medium severity) and no known exploits in the wild.
AI-Powered Analysis
Technical Analysis
CVE-2025-59472 is a denial of service (DoS) vulnerability affecting Vercel's Next.js framework, specifically versions from 15.0.0-canary.0 up to 16.1.0, when Partial Prerendering (PPR) is enabled via experimental.ppr or cacheComponents configuration and the environment variable NEXT_PRIVATE_MINIMAL_MODE=1 is set. The vulnerability arises in the PPR resume endpoint, which accepts unauthenticated POST requests containing the 'Next-Resume: 1' header. The server processes postponed state data sent by the client without proper validation or size restrictions. Two related flaws enable memory exhaustion attacks: (1) The server buffers the entire POST request body into memory using Buffer.concat() without imposing size limits, allowing attackers to send arbitrarily large payloads that consume all available memory. (2) The server decompresses cached resume data using inflateSync() without limiting the decompressed output size, enabling zipbomb-style attacks where a small compressed payload expands to hundreds of megabytes or gigabytes, overwhelming memory resources. Both attack vectors cause the Node.js process to crash with a fatal V8 out-of-memory error, resulting in denial of service and application downtime. The zipbomb variant is particularly dangerous because it can bypass reverse proxy request size limits, making traditional network-layer protections ineffective. Exploitation requires no authentication or user interaction, increasing the attack surface. The vulnerability is tracked under CWE-400 (Uncontrolled Resource Consumption). Although no known exploits are currently reported in the wild, the medium CVSS score (5.9) reflects the moderate complexity of exploitation and significant impact on availability. Mitigation involves upgrading to Next.js versions 15.6.0-canary.61 or 16.1.5, which include fixes to enforce request body size limits and decompression output restrictions, preventing memory exhaustion. Organizations should audit their Next.js configurations to identify use of PPR and minimal mode and apply patches promptly to avoid service disruptions.
Potential Impact
For European organizations, this vulnerability poses a significant risk to the availability of web applications built on vulnerable Next.js versions with Partial Prerendering enabled in minimal mode. Successful exploitation results in server crashes due to memory exhaustion, causing denial of service and potential downtime of critical web services. This can disrupt business operations, degrade user experience, and potentially lead to financial losses and reputational damage. Since the attack requires no authentication and can bypass reverse proxy request size limits via zipbomb payloads, traditional perimeter defenses may be insufficient. Organizations relying on Next.js for customer-facing websites, e-commerce platforms, or internal portals are particularly vulnerable. The impact is amplified in sectors with high web traffic or stringent uptime requirements, such as finance, healthcare, and government services. Additionally, the vulnerability could be exploited as part of larger distributed denial of service (DDoS) campaigns targeting European digital infrastructure. Although no data confidentiality or integrity is directly affected, the availability impact alone warrants urgent remediation to maintain service continuity and comply with regulatory requirements such as the EU NIS Directive.
Mitigation Recommendations
1. Upgrade Next.js to version 15.6.0-canary.61 or 16.1.5 or later, which include patches to limit request body buffering and decompression output size. 2. Audit application configurations to identify use of experimental.ppr or cacheComponents features and the NEXT_PRIVATE_MINIMAL_MODE=1 environment variable; disable these features if not strictly necessary. 3. Implement application-layer request size limits and decompression size limits where possible to prevent large payload processing. 4. Deploy Web Application Firewalls (WAFs) with custom rules to detect and block POST requests containing the 'Next-Resume: 1' header or suspiciously large payloads targeting the PPR resume endpoint. 5. Monitor server memory usage and Node.js process health to detect anomalous spikes indicative of exploitation attempts. 6. Use rate limiting on the PPR resume endpoint to reduce the risk of repeated exploitation attempts. 7. Conduct regular security testing and code reviews focusing on resource consumption vulnerabilities in server-side rendering features. 8. Coordinate with hosting providers or cloud platforms to apply network-level protections against zipbomb and large payload attacks. 9. Educate development teams about the risks of enabling experimental features in production environments without thorough security assessments.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- hackerone
- Date Reserved
- 2025-09-16T15:00:07.876Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6977e1c04623b1157cbdb6a0
Added to database: 1/26/2026, 9:50:56 PM
Last enriched: 2/3/2026, 8:44:12 AM
Last updated: 2/7/2026, 7:17:58 AM
Views: 131
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2076: Improper Authorization in yeqifu warehouse
MediumCVE-2025-15491: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Post Slides
HighCVE-2025-15267: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in boldthemes Bold Page Builder
MediumCVE-2025-13463: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in boldthemes Bold Page Builder
MediumCVE-2025-12803: CWE-80 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in boldthemes Bold Page Builder
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.