Interpretation Conflict Affecting next package, versions >=15.3.0 <15.3.3


Severity

Recommended
0.0
medium
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.04% (12th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-JS-NEXT-10598338
  • published4 Jul 2025
  • disclosed3 Jul 2025
  • creditUnknown

Introduced: 3 Jul 2025

NewCVE-2025-49005  (opens in a new tab)
CWE-436  (opens in a new tab)

How to fix?

Upgrade next to version 15.3.3 or higher.

Overview

next is a react framework.

Affected versions of this package are vulnerable to Interpretation Conflict in the Server class, which may accept and cache Vary headers. An attacker can poison a browser cache (or a CDN cache in self-hosted environment) with RSC content passed in as HTML, which is served to other users.

Workaround

This vulnerability can be avoided by adding the Vary header to RSC responses with Vary: RSC, Next-Router-State-Tree, Next-Router-Prefetch, or by clearing the cache with middleware.

CVSS Base Scores

version 4.0
version 3.1