Loading HuntDB...

GHSA-7m27-7ghc-44w9

GitHub Security Advisory

Next.js Allows a Denial of Service (DoS) with Server Actions

✓ GitHub Reviewed MODERATE Has CVE

Advisory Details

### Impact
A Denial of Service (DoS) attack allows attackers to construct requests that leaves requests to Server Actions hanging until the hosting provider cancels the function execution.

_Note: Next.js server is idle during that time and only keeps the connection open. CPU and memory footprint are low during that time._

Deployments without any protection against long running Server Action invocations are especially vulnerable. Hosting providers like Vercel or Netlify set a default maximum duration on function execution to reduce the risk of excessive billing.

This is the same issue as if the incoming HTTP request has an invalid `Content-Length` header or never closes. If the host has no other mitigations to those then this vulnerability is novel.

This vulnerability affects only Next.js deployments using Server Actions.

### Patches

This vulnerability was resolved in Next.js 14.2.21, 15.1.2, and 13.5.8. We recommend that users upgrade to a safe version.

### Workarounds

There are no official workarounds for this vulnerability.

### Credits

Thanks to the PackDraw team for responsibly disclosing this vulnerability.

Affected Packages

npm next
Affected versions: 13.0.0 (fixed in 13.5.8)
npm next
Affected versions: 14.0.0 (fixed in 14.2.21)
npm next
Affected versions: 15.0.0 (fixed in 15.1.2)

Related CVEs

Key Information

GHSA ID
GHSA-7m27-7ghc-44w9
Published
January 3, 2025 8:19 PM
Last Modified
January 3, 2025 9:48 PM
CVSS Score
5.0 /10
Primary Ecosystem
npm
Primary Package
next
GitHub Reviewed
✓ Yes

Dataset

Last updated: July 3, 2025 6:16 AM

Data from GitHub Advisory Database. This information is provided for research and educational purposes.