Vulnerability Description
Next.js is a React framework for building full-stack web applications. From versions 15.0.4-canary.51 to before 15.1.8, a cache poisoning bug leading to a Denial of Service (DoS) condition was found in Next.js. This issue does not impact customers hosted on Vercel. Under certain conditions, this issue may allow a HTTP 204 response to be cached for static pages, leading to the 204 response being served to all users attempting to access the page. This issue has been addressed in version 15.1.8.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Vercel | Next.Js | < 15.1.8 |
Related Weaknesses (CWE)
References
- https://github.com/vercel/next.js/commit/a15b974ed707d63ad4da5b74c1441f5b7b120e9Patch
- https://github.com/vercel/next.js/releases/tag/v15.1.8Release Notes
- https://github.com/vercel/next.js/security/advisories/GHSA-67rr-84xm-4c7rVendor Advisory
- https://vercel.com/changelog/cve-2025-49826Vendor Advisory
FAQ
What is CVE-2025-49826?
CVE-2025-49826 is a vulnerability with a CVSS score of 7.5 (HIGH). Next.js is a React framework for building full-stack web applications. From versions 15.0.4-canary.51 to before 15.1.8, a cache poisoning bug leading to a Denial of Service (DoS) condition was found i...
How severe is CVE-2025-49826?
CVE-2025-49826 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-49826?
Check the references section above for vendor advisories and patch information. Affected products include: Vercel Next.Js.