Use of Cache Containing Sensitive Information Affecting next package, versions <14.2.31>=15.0.0 <15.4.2-canary.19>=15.4.3 <15.4.5


Severity

Recommended
0.0
medium
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.01% (2nd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-JS-NEXT-12301496
  • published31 Aug 2025
  • disclosed29 Aug 2025
  • creditreddounsf

Introduced: 29 Aug 2025

NewCVE-2025-57752  (opens in a new tab)
CWE-524  (opens in a new tab)

How to fix?

Upgrade next to version 14.2.31, 15.4.2-canary.19, 15.4.5 or higher.

Overview

next is a react framework.

Affected versions of this package are vulnerable to Use of Cache Containing Sensitive Information in the image optimization process, when responses from API routes vary based on request headers such as Cookie or Authorization. An attacker can gain unauthorized access to sensitive image data by exploiting cache key confusion, causing responses intended for authenticated users to be served to unauthorized users.

Note: Exploitation requires a prior authorized request to populate the cache.

CVSS Base Scores

version 4.0
version 3.1