Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-59472: Vulnerability in vercel next

0
Medium
VulnerabilityCVE-2025-59472cvecve-2025-59472
Published: Mon Jan 26 2026 (01/26/2026, 21:43:05 UTC)
Source: CVE Database V5
Vendor/Project: vercel
Product: next

Description

CVE-2025-59472 is a denial of service vulnerability in Vercel's Next. js framework when Partial Prerendering (PPR) is enabled and running in minimal mode. The vulnerability arises from unauthenticated POST requests to the PPR resume endpoint that accept attacker-controlled data, leading to unbounded memory consumption. Two main attack vectors exist: unbounded request body buffering and unbounded decompression of compressed payloads (zipbomb), both causing fatal out-of-memory errors and crashing the Node. js process. Exploitation requires the application to be configured with experimental. ppr: true or cacheComponents: true and NEXT_PRIVATE_MINIMAL_MODE=1. The vulnerability affects many Next. js canary versions prior to 15. 6.

AI-Powered Analysis

AILast updated: 01/26/2026, 22:05:20 UTC

Technical Analysis

CVE-2025-59472 is a denial of service (DoS) vulnerability affecting Vercel's Next.js framework versions with Partial Prerendering (PPR) enabled and running in minimal mode (NEXT_PRIVATE_MINIMAL_MODE=1). The vulnerability stems from the PPR resume endpoint accepting unauthenticated POST requests containing the 'Next-Resume: 1' header and processing attacker-controlled postponed state data without proper input validation or resource constraints. Two closely related issues enable an attacker to exhaust server memory and crash the Node.js process: (1) unbounded request body buffering, where the server concatenates the entire POST request body into memory using Buffer.concat() without enforcing size limits, allowing arbitrarily large payloads to consume all available memory; and (2) unbounded decompression, where the resume data cache is decompressed using inflateSync() without limiting the decompressed output size, enabling a small compressed payload (zipbomb) to expand to hundreds of megabytes or gigabytes, causing memory exhaustion. The resulting fatal V8 out-of-memory error terminates the server process, causing denial of service. The zipbomb attack is particularly dangerous as it can bypass reverse proxy request size limits by sending small compressed payloads that decompress into large memory allocations. To be vulnerable, applications must have experimental.ppr or cacheComponents enabled and run in minimal mode. The affected versions include numerous 15.x canary releases and 16.1.0, with fixes introduced in 15.6.0-canary.61 and 16.1.5. The CVSS 3.1 score is 5.9 (medium), reflecting network attack vector, high attack complexity, no privileges required, no user interaction, and impact limited to availability. No known exploits are currently reported in the wild. This vulnerability primarily threatens availability of Next.js applications configured with these experimental features, potentially causing service outages and impacting user experience.

Potential Impact

For European organizations using Next.js with Partial Prerendering enabled and running in minimal mode, this vulnerability poses a significant risk of denial of service through memory exhaustion attacks. Such attacks can cause server crashes and application downtime, disrupting business operations, customer-facing services, and internal tools relying on Next.js. Organizations in sectors with high web service availability requirements—such as e-commerce, finance, healthcare, and public services—may experience reputational damage and financial losses due to outages. The zipbomb attack vector can circumvent typical reverse proxy protections, making mitigation more challenging. Since the vulnerability does not affect confidentiality or integrity, data breaches are unlikely, but availability impacts can be severe, especially for high-traffic applications. The widespread use of Next.js in Europe, particularly in technology hubs and digital service providers, increases the potential attack surface. Additionally, the unauthenticated nature of the attack means any external attacker can attempt exploitation without credentials, increasing risk. The medium CVSS score reflects the moderate ease of exploitation balanced against the limited impact scope, but the potential for large-scale service disruption remains a concern.

Mitigation Recommendations

1. Upgrade all affected Next.js applications to version 15.6.0-canary.61, 16.1.5, or later where the vulnerability is patched. 2. Disable Partial Prerendering (experimental.ppr) and cacheComponents features if they are not essential, or avoid running in minimal mode (NEXT_PRIVATE_MINIMAL_MODE=1) until patched versions are deployed. 3. Implement strict request size limits at the reverse proxy or load balancer level to restrict maximum POST body sizes, although this alone may not prevent zipbomb attacks. 4. Introduce decompression size limits or timeouts in the application layer to prevent excessive memory allocation during inflateSync() operations. 5. Monitor application logs and server metrics for unusual spikes in memory usage or request patterns targeting the PPR resume endpoint. 6. Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious POST requests containing the 'Next-Resume: 1' header or unusually large payloads. 7. Conduct regular security assessments and penetration tests focusing on DoS vectors related to request handling and decompression. 8. Educate development teams about the risks of enabling experimental features in production environments without thorough security evaluation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
hackerone
Date Reserved
2025-09-16T15:00:07.876Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6977e1c04623b1157cbdb6a0

Added to database: 1/26/2026, 9:50:56 PM

Last enriched: 1/26/2026, 10:05:20 PM

Last updated: 1/27/2026, 1:28:33 AM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats