Loading HuntDB...

GHSA-fr5h-rqp8-mj6g

GitHub Security Advisory

Next.js Server-Side Request Forgery in Server Actions

✓ GitHub Reviewed HIGH Has CVE

Advisory Details

### Impact
A Server-Side Request Forgery (SSRF) vulnerability was identified in Next.js Server Actions by security researchers at Assetnote. If the `Host` header is modified, and the below conditions are also met, an attacker may be able to make requests that appear to be originating from the Next.js application server itself.

#### Prerequisites
* Next.js (`<14.1.1`) is running in a self-hosted* manner.
* The Next.js application makes use of Server Actions.
* The Server Action performs a redirect to a relative path which starts with a `/`.

\* Many hosting providers (including Vercel) route requests based on the Host header, so we do not believe that this vulnerability affects any Next.js applications where routing is done in this manner.

### Patches
This vulnerability was patched in [#62561](https://github.com/vercel/next.js/pull/62561) and fixed in Next.js `14.1.1`.

### Workarounds
There are no official workarounds for this vulnerability. We recommend upgrading to Next.js `14.1.1`.

### Credit
Vercel and the Next.js team thank Assetnote for responsibly disclosing this issue to us, and for working with us to verify the fix. Thanks to:

Adam Kues - Assetnote
Shubham Shah - Assetnote

Affected Packages

npm next
Affected versions: 13.4.0 (fixed in 14.1.1)

Related CVEs

Key Information

GHSA ID
GHSA-fr5h-rqp8-mj6g
Published
May 9, 2024 9:18 PM
Last Modified
May 14, 2024 8:02 PM
CVSS Score
7.5 /10
Primary Ecosystem
npm
Primary Package
next
GitHub Reviewed
✓ Yes

Dataset

Last updated: July 27, 2025 6:35 AM

Data from GitHub Advisory Database. This information is provided for research and educational purposes.