Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-27980: CWE-400: Uncontrolled Resource Consumption in vercel next.js

0
Medium
VulnerabilityCVE-2026-27980cvecve-2026-27980cwe-400
Published: Wed Mar 18 2026 (03/18/2026, 00:23:34 UTC)
Source: CVE Database V5
Vendor/Project: vercel
Product: next.js

Description

CVE-2026-27980 is a medium-severity vulnerability in the Next. js React framework versions 10. 0. 0 up to but not including 16. 1. 7. The issue arises from an uncontrolled resource consumption flaw in the default image optimization disk cache, which lacks an upper bound on cache size. An attacker can exploit this by generating numerous unique image variants, causing the cache to grow without limit and eventually exhausting disk space, leading to denial of service. The vulnerability requires no authentication or user interaction and can be triggered remotely. The issue is resolved in Next.

AI-Powered Analysis

AILast updated: 03/18/2026, 01:13:24 UTC

Technical Analysis

CVE-2026-27980 is a resource exhaustion vulnerability classified under CWE-400 affecting the Next.js framework, specifically its image optimization disk cache feature introduced in version 10.0.0. The default cache located at `/_next/image` did not impose any configurable limit on disk usage, allowing unbounded growth. Attackers can exploit this by requesting many unique image optimization variants, each cached separately, causing the disk cache to expand indefinitely. This unbounded cache growth can consume all available disk space on the server, resulting in denial of service due to resource exhaustion. The vulnerability does not require authentication or user interaction and can be triggered remotely over the network. The fix, introduced in Next.js 16.1.7, adds an LRU (Least Recently Used) cache mechanism with a configurable maximum disk cache size (`images.maximumDiskCacheSize`) that evicts the least recently used entries when the limit is reached. Setting this value to zero disables disk caching entirely. For environments where immediate upgrading is not feasible, administrators are advised to periodically clean the `.next/cache/images` directory and reduce the cardinality of image variants by tightening configuration parameters such as `images.localPatterns`, `images.remotePatterns`, and `images.qualities`. This vulnerability impacts any web application using the affected Next.js versions with image optimization enabled, potentially leading to service outages and degraded user experience.

Potential Impact

The primary impact of this vulnerability is denial of service caused by disk space exhaustion on servers running vulnerable Next.js versions. Organizations hosting web applications with image optimization enabled are at risk of service disruption if an attacker floods the cache with numerous unique image requests. This can lead to application downtime, degraded performance, and potential loss of revenue or user trust. Since the exploit requires no authentication or user interaction, it can be executed by any remote attacker, increasing the risk of opportunistic or targeted attacks. The vulnerability could also indirectly affect other services on the same server if disk space is fully consumed, potentially impacting broader infrastructure. Organizations relying heavily on Next.js for public-facing applications, especially those with high traffic or image-heavy content, are particularly vulnerable. Although no known exploits are reported in the wild yet, the ease of exploitation and potential impact warrant prompt mitigation.

Mitigation Recommendations

To mitigate this vulnerability, organizations should upgrade Next.js to version 16.1.7 or later, which includes the fix with an LRU-backed disk cache and configurable maximum disk cache size. If immediate upgrading is not possible, administrators should implement the following measures: 1) Regularly schedule automated or manual cleanup of the `.next/cache/images` directory to prevent uncontrolled cache growth. 2) Reduce the number of unique image variants generated by tightening configuration settings such as `images.localPatterns`, `images.remotePatterns`, and `images.qualities` to limit variant cardinality. 3) Consider disabling disk caching by setting `images.maximumDiskCacheSize` to zero if caching is not critical for performance. 4) Monitor disk usage closely on servers running vulnerable versions to detect abnormal growth early. 5) Implement rate limiting or request filtering on image optimization endpoints to prevent abuse by excessive unique requests. These steps help contain the risk until a full upgrade can be performed.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-25T03:24:57.793Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69b9f8b0771bdb174900ac91

Added to database: 3/18/2026, 12:58:24 AM

Last enriched: 3/18/2026, 1:13:24 AM

Last updated: 3/18/2026, 6:10:30 AM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses