Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-59472: Vulnerability in vercel next

0
Medium
VulnerabilityCVE-2025-59472cvecve-2025-59472
Published: Mon Jan 26 2026 (01/26/2026, 21:43:05 UTC)
Source: CVE Database V5
Vendor/Project: vercel
Product: next

Description

CVE-2025-59472 is a denial of service vulnerability in Vercel Next. js versions with Partial Prerendering (PPR) enabled and running in minimal mode. It allows unauthenticated attackers to send specially crafted POST requests with the 'Next-Resume: 1' header to the PPR resume endpoint, causing the server to exhaust memory and crash. The attack exploits two main issues: unbounded buffering of the request body and unbounded decompression of cached resume data, including a zipbomb-style payload. This leads to a fatal JavaScript heap out-of-memory error, terminating the Node. js process and causing application downtime. Exploitation requires the application to be configured with experimental. ppr or cacheComponents enabled and NEXT_PRIVATE_MINIMAL_MODE=1. The vulnerability has a CVSS score of 5. 9 (medium severity) and no known exploits in the wild.

AI-Powered Analysis

AILast updated: 02/03/2026, 08:44:12 UTC

Technical Analysis

CVE-2025-59472 is a denial of service (DoS) vulnerability affecting Vercel's Next.js framework, specifically versions from 15.0.0-canary.0 up to 16.1.0, when Partial Prerendering (PPR) is enabled via experimental.ppr or cacheComponents configuration and the environment variable NEXT_PRIVATE_MINIMAL_MODE=1 is set. The vulnerability arises in the PPR resume endpoint, which accepts unauthenticated POST requests containing the 'Next-Resume: 1' header. The server processes postponed state data sent by the client without proper validation or size restrictions. Two related flaws enable memory exhaustion attacks: (1) The server buffers the entire POST request body into memory using Buffer.concat() without imposing size limits, allowing attackers to send arbitrarily large payloads that consume all available memory. (2) The server decompresses cached resume data using inflateSync() without limiting the decompressed output size, enabling zipbomb-style attacks where a small compressed payload expands to hundreds of megabytes or gigabytes, overwhelming memory resources. Both attack vectors cause the Node.js process to crash with a fatal V8 out-of-memory error, resulting in denial of service and application downtime. The zipbomb variant is particularly dangerous because it can bypass reverse proxy request size limits, making traditional network-layer protections ineffective. Exploitation requires no authentication or user interaction, increasing the attack surface. The vulnerability is tracked under CWE-400 (Uncontrolled Resource Consumption). Although no known exploits are currently reported in the wild, the medium CVSS score (5.9) reflects the moderate complexity of exploitation and significant impact on availability. Mitigation involves upgrading to Next.js versions 15.6.0-canary.61 or 16.1.5, which include fixes to enforce request body size limits and decompression output restrictions, preventing memory exhaustion. Organizations should audit their Next.js configurations to identify use of PPR and minimal mode and apply patches promptly to avoid service disruptions.

Potential Impact

For European organizations, this vulnerability poses a significant risk to the availability of web applications built on vulnerable Next.js versions with Partial Prerendering enabled in minimal mode. Successful exploitation results in server crashes due to memory exhaustion, causing denial of service and potential downtime of critical web services. This can disrupt business operations, degrade user experience, and potentially lead to financial losses and reputational damage. Since the attack requires no authentication and can bypass reverse proxy request size limits via zipbomb payloads, traditional perimeter defenses may be insufficient. Organizations relying on Next.js for customer-facing websites, e-commerce platforms, or internal portals are particularly vulnerable. The impact is amplified in sectors with high web traffic or stringent uptime requirements, such as finance, healthcare, and government services. Additionally, the vulnerability could be exploited as part of larger distributed denial of service (DDoS) campaigns targeting European digital infrastructure. Although no data confidentiality or integrity is directly affected, the availability impact alone warrants urgent remediation to maintain service continuity and comply with regulatory requirements such as the EU NIS Directive.

Mitigation Recommendations

1. Upgrade Next.js to version 15.6.0-canary.61 or 16.1.5 or later, which include patches to limit request body buffering and decompression output size. 2. Audit application configurations to identify use of experimental.ppr or cacheComponents features and the NEXT_PRIVATE_MINIMAL_MODE=1 environment variable; disable these features if not strictly necessary. 3. Implement application-layer request size limits and decompression size limits where possible to prevent large payload processing. 4. Deploy Web Application Firewalls (WAFs) with custom rules to detect and block POST requests containing the 'Next-Resume: 1' header or suspiciously large payloads targeting the PPR resume endpoint. 5. Monitor server memory usage and Node.js process health to detect anomalous spikes indicative of exploitation attempts. 6. Use rate limiting on the PPR resume endpoint to reduce the risk of repeated exploitation attempts. 7. Conduct regular security testing and code reviews focusing on resource consumption vulnerabilities in server-side rendering features. 8. Coordinate with hosting providers or cloud platforms to apply network-level protections against zipbomb and large payload attacks. 9. Educate development teams about the risks of enabling experimental features in production environments without thorough security assessments.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
hackerone
Date Reserved
2025-09-16T15:00:07.876Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6977e1c04623b1157cbdb6a0

Added to database: 1/26/2026, 9:50:56 PM

Last enriched: 2/3/2026, 8:44:12 AM

Last updated: 2/7/2026, 7:17:58 AM

Views: 131

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats