Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Microsoft Exposes Kazuar Malware’s Modular P Details Malware’s
May 15, 2026
VMware Fusion Vulnerability Let Attackers Escalate Privilege to Root
May 15, 2026
Hackers Abuse Scheduled Tasks for FrostyNeighbor Persistence
May 15, 2026
Home/Vulnerabilities/Critical Next.js Flaw Exposes Cloud Vulnerability Credentials
Vulnerabilities

Critical Next.js Flaw Exposes Cloud Vulnerability Credentials

A critical, high-severity vulnerability has been identified in Next.js, posing a significant threat to self-hosted web applications. Exploitation of this flaw could lead to severe data breaches....

Sarah simpson
Sarah simpson
May 15, 2026 2 Min Read
1 0

A critical, high-severity vulnerability has been identified in Next.js, posing a significant threat to self-hosted web applications. Exploitation of this flaw could lead to severe data breaches.

Threat actors can now exploit a Server-Side Request Forgery (SSRF) flaw to silently steal cloud credentials, harvest API keys, and access sensitive internal admin panels.

Organizations running self-hosted Next.js environments must patch immediately to prevent attackers from pivoting into their internal networks.

Next.js Flaw Exposes Credentials

The vulnerability, tracked as CVE-2026-44578, originates in how the built-in Next.js Node.js server handles WebSocket upgrade requests.

Attackers can send specially crafted WebSocket requests that trick the server into acting as a proxy. This forces the server to forward malicious requests to arbitrary internal or external destinations.

Because the server itself executes the request, it bypasses external firewalls. Attackers can use this trusted position to query internal network services, access unprotected admin dashboards, or reach cloud metadata endpoints.

Cloud metadata endpoints are particularly valuable targets because they often store temporary IAM credentials, API tokens, and deployment secrets.

This SSRF vulnerability strictly impacts self-hosted Next.js applications relying on the default Node.js server.

If your application runs on Vercel, you remain completely safe from this exploit. The Vercel infrastructure does not utilize the vulnerable WebSocket routing implementation.

If you manage your own infrastructure, you must verify your Next.js version. The flaw affects two distinct release tracks in the Next.js ecosystem.

The Next.js maintenance team has released security patches that apply strict safety checks to WebSocket upgrade handling.

The server now only proxies upgrade requests when routing configurations explicitly mark them as safe external rewrites.

Tim Neutkens disclosed GHSA-c4j6-fc7j-m34r on GitHub, advising developers to upgrade to Next.js 15.5.16 or 16.2.5 immediately. Where patching isn’t possible, network-level protections are recommended.

Administrators should configure reverse proxies or load balancers to block all WebSocket upgrade requests if the application does not actively use them.

Additionally, security teams must restrict the origin server’s outbound traffic, completely blocking access to internal cloud metadata services and unrelated internal networks.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackBreachCVEExploitPatchSecurityThreatVulnerability

Share Article

Sarah simpson

Sarah simpson

Sarah is a cybersecurity journalist specializing in threat intelligence and malware analysis. With over 8 years of experience covering APT groups, zero-day exploits, and advanced persistent threats, Sarah brings deep technical expertise to breaking cybersecurity news. Previously, she worked as a security researcher at leading threat intelligence firms, where she analyzed malware samples and tracked cybercriminal operations. Sarah holds a Master's degree in Computer Science with a focus on cybersecurity and is a regular contributor to major security conferences.

Previous Post

OpenAI Confirms Security Breach from TanStack npm Attack

Next Post

Critical Microsoft Exchange Server Flaw Actively Exploited

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Critical Next.js Flaw Exposes Cloud Vulnerability Credentials
May 15, 2026
OpenAI Confirms Security Breach from TanStack npm Attack
May 15, 2026
Cisco Catalyst SD-WAN Controller 0-Day Actively Exploited to Gain
May 15, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Jennifer sherman
Jennifer sherman
Sarah simpson
Sarah simpson
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us