Loading HuntDB...

GHSA-77r5-gw3j-2mpf

GitHub Security Advisory

Next.js Vulnerable to HTTP Request Smuggling

✓ GitHub Reviewed HIGH Has CVE

Advisory Details

### Impact
Inconsistent interpretation of a crafted HTTP request meant that requests are treated as both a single request, and two separate requests by Next.js, leading to desynchronized responses. This led to a response queue poisoning vulnerability in the affected Next.js versions.

For a request to be exploitable, the affected route also had to be making use of the [rewrites](https://nextjs.org/docs/app/api-reference/next-config-js/rewrites) feature in Next.js.

### Patches
The vulnerability is resolved in Next.js `13.5.1` and newer. This includes Next.js `14.x`.

### Workarounds
There are no official workarounds for this vulnerability. We recommend that you upgrade to a safe version.

### References
https://portswigger.net/web-security/request-smuggling/advanced/response-queue-poisoning

Affected Packages

npm next
Affected versions: 13.4.0 (fixed in 13.5.1)

Related CVEs

Key Information

GHSA ID
GHSA-77r5-gw3j-2mpf
Published
May 9, 2024 9:07 PM
Last Modified
July 9, 2024 6:28 PM
CVSS Score
7.5 /10
Primary Ecosystem
npm
Primary Package
next
GitHub Reviewed
✓ Yes

Dataset

Last updated: July 5, 2025 6:26 AM

Data from GitHub Advisory Database. This information is provided for research and educational purposes.