nomisec
WORKING POC
96 stars
by aydinnyunus · poc
https://github.com/aydinnyunus/CVE-2025-29927
This repository demonstrates CVE-2025-29927, a Next.js middleware bypass vulnerability where the internal header `x-middleware-subrequest` can be manipulated to skip authentication checks. The PoC includes a test script to verify the bypass and a vulnerable middleware configuration.
Classification
Working Poc 95%
Target:
Next.js 15.x < 15.2.3, 14.x < 14.2.25, 13.x < 13.5.9
No auth needed
Prerequisites:
Self-hosted Next.js application using middleware · Access to the target application
nomisec
SCANNER
82 stars
by AnonKryptiQuz · remote
https://github.com/AnonKryptiQuz/NextSploit
This repository contains a scanner tool designed to detect CVE-2025-29927, a vulnerability in Next.js versions below 14.2.25 and 15.2.3. It uses Wappalyzer to identify the Next.js version and checks for vulnerability by sending a crafted HTTP request with the 'x-middleware-subrequest' header.
Classification
Scanner 90%
Target:
Next.js versions below 14.2.25 and 15.2.3
No auth needed
Prerequisites:
Wappalyzer installed · Python environment with required packages · Access to the target URL
nomisec
SCANNER
19 stars
by websecnl · remote
https://github.com/websecnl/CVE-2025-29927-PoC-Exploit
This is a scanner script designed to detect CVE-2025-29927 by testing various endpoints and payloads related to Next.js middleware vulnerabilities. It checks for differences in responses when injecting specific headers to identify potential vulnerabilities.
Classification
Scanner 90%
Target:
Next.js (specific version not specified)
No auth needed
Prerequisites:
Access to the target web application · Network connectivity to the target
nomisec
SCANNER
18 stars
by 6mile · remote
https://github.com/6mile/nextjs-CVE-2025-29927
This repository provides a Nuclei template to detect CVE-2025-29927, a Next.js authentication bypass vulnerability. It checks for the presence of Next.js and middleware usage via HTTP headers but does not fully confirm exploitability.
Classification
Scanner 90%
Target:
Next.js (versions affected by CVE-2025-29927)
No auth needed
Prerequisites:
Target must be a Next.js application · Target must use middleware with detectable headers
nomisec
WORKING POC
15 stars
by azu · remote
https://github.com/azu/nextjs-cve-2025-29927-poc
This PoC demonstrates an authentication bypass in Next.js middleware (CVE-2025-29927) by exploiting a vulnerability where adding a specific header (`X-Middleware-Subrequest`) allows bypassing middleware logic that should block requests.
Classification
Working Poc 100%
Target:
Next.js v15.2.2
No auth needed
Prerequisites:
Next.js application with middleware configured to block requests
nomisec
WORKING POC
14 stars
by lirantal · remote
https://github.com/lirantal/vulnerable-nextjs-14-CVE-2025-29927
This repository demonstrates an authorization bypass vulnerability (CVE-2025-29927) in Next.js 14 by exploiting the `x-middleware-subrequest` header to bypass middleware authentication checks. The PoC includes a vulnerable Next.js application and instructions to reproduce the bypass.
Classification
Working Poc 100%
Target:
Next.js 14 (and older versions with _middleware.js)
No auth needed
Prerequisites:
Access to the target Next.js application · Ability to send HTTP requests with custom headers
nomisec
WRITEUP
9 stars
by MuhammadWaseem29 · remote
https://github.com/MuhammadWaseem29/CVE-2025-29927-POC
This repository provides a detailed writeup and proof-of-concept for CVE-2025-29927, demonstrating an authentication bypass via a custom HTTP header (`X-Middleware-Subrequest`) to access restricted content. It includes step-by-step HTTP request/response examples and replication instructions using `curl`.
Classification
Writeup 90%
Target:
Middleware handling within a web application (e.g., Nginx with Next.js)
No auth needed
Prerequisites:
A target server running vulnerable middleware configuration · An HTTP client tool like `curl` or Burp Suite
nomisec
WORKING POC
9 stars
by phoscoder · poc
https://github.com/phoscoder/ghost-route
This repository contains a Python script to test for CVE-2025-29927, a Next.js middleware vulnerability allowing authentication bypass via the `x-middleware-subrequest` header. The script sends multiple payloads to check for vulnerability and analyzes response codes and URLs.
Classification
Working Poc 95%
Target:
Next.js versions 11.1.4 and up
No auth needed
Prerequisites:
Target must be a Next.js application with vulnerable middleware · Network access to the target application
nomisec
SCANNER
8 stars
by gotr00t0day · remote
https://github.com/gotr00t0day/CVE-2025-29927
This repository contains a scanner for detecting CVE-2025-29927, a Next.js middleware bypass vulnerability. The tool checks for the presence of vulnerable endpoints by sending crafted HTTP headers and analyzing responses.
Classification
Scanner 95%
Target:
Next.js versions 11.1.4 through 15.2.2
No auth needed
Prerequisites:
Network access to the target Next.js application
nomisec
WORKING POC
8 stars
by UNICORDev · remote
https://github.com/UNICORDev/exploit-CVE-2025-29927
This is a functional exploit for CVE-2025-29927, which bypasses Next.js middleware authorization checks by injecting the `x-middleware-subrequest` header. The PoC includes version detection and crafted requests to exploit vulnerable Next.js instances.
Classification
Working Poc 95%
Target:
Next.js versions 15.0.0-15.2.2, 14.0.0-14.2.24, 13.0.0-13.5.8, 11.1.4-12.3.4
No auth needed
Prerequisites:
Target URL · Vulnerable Next.js version (optional) · Middleware path (optional)
nomisec
WORKING POC
7 stars
by KaztoRay · poc
https://github.com/KaztoRay/CVE-2025-29927-Research
This PoC demonstrates a middleware bypass vulnerability in Next.js by testing different header combinations to access protected routes without proper authentication. It checks for the presence of protected content in responses to confirm exploitation.
Classification
Working Poc 90%
Target:
Next.js (version not specified)
No auth needed
Prerequisites:
Access to a vulnerable Next.js application running on localhost:3000
nomisec
SCANNER
5 stars
by HoumanPashaei · remote
https://github.com/HoumanPashaei/CVE-2025-29927
This repository contains a Python-based scanner for detecting CVE-2025-29927, a middleware bypass vulnerability in Next.js applications. It uses Playwright for dynamic crawling and multithreaded scanning to identify internal paths vulnerable to unauthorized access via the `X-Middleware-Subrequest` header.
Classification
Scanner 95%
Target:
Next.js versions 11.1.4 through 15.2.2
No auth needed
Prerequisites:
Target domain URL · Playwright installation · Python environment
nomisec
WORKING POC
5 stars
by strobes-security · poc
https://github.com/strobes-security/nextjs-vulnerable-app
This repository contains a Next.js application with a vulnerable authentication implementation, specifically targeting CVE-2025-29927. The PoC demonstrates an authentication bypass vulnerability in NextAuth.js.
Classification
Working Poc 90%
Target:
Next.js with NextAuth.js
No auth needed
Prerequisites:
Access to the vulnerable Next.js application
nomisec
WORKING POC
5 stars
by kOaDT · remote
https://github.com/kOaDT/poc-cve-2025-29927
This repository contains a functional proof-of-concept for CVE-2025-29927, demonstrating a middleware bypass vulnerability in Next.js via the `x-middleware-subrequest` header. The exploit script tests for vulnerability by comparing responses with and without the bypass header.
Classification
Working Poc 95%
Target:
Next.js versions 13.0.0-13.5.8, 14.0.0-14.2.24, 15.0.0-15.2.2, 11.1.4-12.3.4
No auth needed
Prerequisites:
Target running vulnerable Next.js version · Access to a protected route
nomisec
WORKING POC
5 stars
by fourcube · remote
https://github.com/fourcube/nextjs-middleware-bypass-demo
This PoC demonstrates an authentication bypass in Next.js middleware by manipulating the `x-middleware-subrequest` header to bypass the cookie-based auth check. The middleware redirects unauthenticated users to `/403`, but the bypass allows access to protected routes.
Classification
Working Poc 100%
Target:
Next.js (version not specified, likely affecting multiple versions)
No auth needed
Prerequisites:
Access to the target Next.js application · Ability to send custom headers
nomisec
WORKING POC
4 stars
by t3tra-dev · remote
https://github.com/t3tra-dev/cve-2025-29927-demo
This repository demonstrates an authorization bypass vulnerability in Next.js (CVE-2025-29927) by exploiting the `x-middleware-subrequest` header to bypass middleware protection on the `/protected` route. The PoC includes a Next.js application with a middleware that checks for an authentication cookie, which can be bypassed by sending a specially crafted header.
Classification
Working Poc 95%
Target:
Next.js 15.2.2
No auth needed
Prerequisites:
Next.js application with middleware protection · Ability to send HTTP requests with custom headers
nomisec
WRITEUP
4 stars
by Ademking · poc
https://github.com/Ademking/CVE-2025-29927
This repository provides a writeup and Nuclei template for detecting CVE-2025-29927, an authorization bypass vulnerability in Next.js middleware. The flaw allows attackers to bypass authorization checks by manipulating the x-middleware-subrequest header.
Classification
Writeup 90%
Target:
Next.js versions prior to 14.2.25 and 15.2.3
No auth needed
Prerequisites:
Nuclei installed · CVE-2025-29927.yaml template file
nomisec
SCANNER
4 stars
by RoyCampos · remote
https://github.com/RoyCampos/CVE-2025-29927
This is a Bash script designed to detect and test for CVE-2025-29927, a Next.js middleware bypass vulnerability. It checks for the presence of Next.js, identifies middleware headers, and tests various payloads to determine if the middleware can be bypassed.
Classification
Scanner 95%
Target:
Next.js (versions affected by CVE-2025-29927)
No auth needed
Prerequisites:
Bash · curl · whatweb · target URL(s)
nomisec
WORKING POC
4 stars
by alihussainzada · remote
https://github.com/alihussainzada/CVE-2025-29927-PoC
This repository demonstrates CVE-2025-29927, a Next.js middleware bypass vulnerability where the `x-middleware-subrequest` header can bypass authentication checks. The PoC includes a functional Next.js application with authentication middleware that can be bypassed using the specified header.
Classification
Working Poc 95%
Target:
Next.js 15.x < 15.2.3, Next.js 14.x < 14.2.25, Next.js 13.x < 13.5.9
No auth needed
Prerequisites:
Access to a vulnerable Next.js application · Ability to send HTTP requests with custom headers
nomisec
WORKING POC
3 stars
by luq0x · remote
https://github.com/luq0x/0xMiddleware
This repository contains a Python-based exploit for CVE-2025-29927, which bypasses Next.js middleware checks by manipulating the `x-middleware-subrequest` header. The tool automates the detection of vulnerable endpoints by comparing responses with and without the exploit header.
Classification
Working Poc 95%
Target:
Next.js versions < 15.2.3, < 14.2.25, < 13.5.9
No auth needed
Prerequisites:
List of target URLs · Network access to the target
nomisec
WORKING POC
3 stars
by c0dejump · remote
https://github.com/c0dejump/CVE-2025-29927-check
This PoC checks for CVE-2025-29927, an authentication bypass vulnerability in Next.js middleware by manipulating the 'x-middleware-subrequest' header. It tests various middleware paths and detects changes in HTTP status codes or content length to confirm exploitation.
Classification
Working Poc 95%
Target:
Next.js (version not specified)
No auth needed
Prerequisites:
Target must be a Next.js application with vulnerable middleware
nomisec
SCANNER
3 stars
by 0xWhoknows · remote
https://github.com/0xWhoknows/CVE-2025-29927
This is an asynchronous Python scanner for detecting CVE-2025-29927 in Next.js applications. It checks for vulnerable endpoints by analyzing HTTP responses and headers, specifically targeting middleware bypass vulnerabilities.
Classification
Scanner 95%
Target:
Next.js (version not specified)
No auth needed
Prerequisites:
List of target URLs · Network access to the target
nomisec
WORKING POC
3 stars
by Eve-SatOrU · infoleak
https://github.com/Eve-SatOrU/POC-CVE-2025-29927
This PoC demonstrates CVE-2025-29927, a vulnerability in Next.js middleware that allows attackers to bypass authentication, authorization, and CSP mechanisms using the x-middleware-subrequest header. It includes exploitation scenarios for bypassing authentication, CSP, and cache poisoning.
Classification
Working Poc 95%
Target:
Next.js versions 11.1.4 to 15.1.7
No auth needed
Prerequisites:
Access to a vulnerable Next.js application
nomisec
SCANNER
2 stars
by ferpalma21 · poc
https://github.com/ferpalma21/Automated-Next.js-Security-Scanner-for-CVE-2025-29927
This repository contains a scanner for detecting Next.js installations vulnerable to CVE-2025-29927. It checks for Next.js usage, version detection, and optionally attempts exploitation using a wordlist.
Classification
Scanner 90%
Target:
Next.js versions prior to 15.2.3, 14.2.25, 13.5.9, 12.3.5
No auth needed
Prerequisites:
List of target URLs or a file containing URLs · Chromium browser for Puppeteer
nomisec
WORKING POC
2 stars
by lem0n817 · poc
https://github.com/lem0n817/CVE-2025-29927
This repository provides a test environment for CVE-2025-29927, a Next.js middleware authorization bypass vulnerability. The PoC demonstrates how an attacker can bypass authentication by manipulating the `x-middleware-subrequest` header.
Classification
Working Poc 95%
Target:
Next.js (version not specified)
No auth needed
Prerequisites:
Access to a vulnerable Next.js application
nomisec
WORKING POC
2 stars
by pouriam23 · poc
https://github.com/pouriam23/Next.js-Middleware-Bypass-CVE-2025-29927-
This repository contains a proof-of-concept for CVE-2025-29927, demonstrating a middleware bypass vulnerability in Next.js. The exploit leverages improper path handling to bypass authentication or access controls.
Classification
Working Poc 80%
Target:
Next.js (version not specified)
No auth needed
Prerequisites:
Access to a vulnerable Next.js application · Knowledge of the application's routing structure
nomisec
WORKING POC
2 stars
by Oyst3r1ng · poc
https://github.com/Oyst3r1ng/CVE-2025-29927
This repository contains a functional PoC for CVE-2025-29927, an authentication bypass vulnerability in Next.js middleware. The exploit leverages the `x-middleware-subrequest` header to trigger a recursion depth check, bypassing authentication mechanisms.
Classification
Working Poc 95%
Target:
Next.js 15.2.2
No auth needed
Prerequisites:
Target running Next.js 15.2.2 with middleware authentication
nomisec
SCANNER
2 stars
by Nekicj · poc
https://github.com/Nekicj/CVE-2025-29927-exploit
The repository contains a scanner for identifying Next.js sites, likely as a precursor to exploiting CVE-2025-29927. It includes a script to check for Next.js sites and another to scrape Google search results for domains.
Classification
Scanner 90%
Target:
Next.js
No auth needed
Prerequisites:
List of URLs or a Google search query
nomisec
WORKING POC
2 stars
by arvion-agent · poc
https://github.com/arvion-agent/next-CVE-2025-29927
This PoC demonstrates an authorization bypass vulnerability in Next.js middleware by exploiting the `x-middleware-subrequest` header to access protected routes without proper authentication. The middleware logic is bypassed, allowing unauthorized access to the `/protected` route.
Classification
Working Poc 90%
Target:
Next.js versions 11.1.4 to 13.5.6, 14.x < 14.2.25, and 15.x < 15.2.3
No auth needed
Prerequisites:
Access to the target Next.js application · Ability to send HTTP requests with custom headers
nomisec
SCANNER
2 stars
by TheresAFewConors · remote
https://github.com/TheresAFewConors/CVE-2025-29927-Testing
This PowerShell script tests for CVE-2025-29927, a middleware bypass vulnerability in Next.js applications. It checks for Next.js usage via headers, extracts version information, and tests for the vulnerability by sending a crafted `x-middleware-subrequest` header.
Classification
Scanner 95%
Target:
Next.js (versions 13.0.0-13.5.8, 14.0.0-14.2.24, 15.0.0-15.2.2)
No auth needed
Prerequisites:
Target URL running a vulnerable version of Next.js · Network access to the target application
github
WORKING POC
2 stars
by ThemeHackers · pythonremote
https://github.com/ThemeHackers/CVE-2025-29972
The repository contains a functional Python exploit for CVE-2025-29927, which bypasses Next.js middleware authorization checks by manipulating the `x-middleware-subrequest` header. The exploit sends crafted HTTP requests to test for vulnerability and checks for protected content in responses.
Classification
Working Poc 95%
Target:
Next.js versions prior to 14.2.25 and 15.2.3
No auth needed
Prerequisites:
Network access to the target Next.js application · Knowledge of protected paths to test
nomisec
SCANNER
2 stars
by emadshanab · infoleak
https://github.com/emadshanab/CVE-2025-29927
This repository provides a Nuclei template for detecting CVE-2025-29927, an authentication bypass vulnerability in Next.js Middleware. It includes techniques for WAF evasion and multi-request variations to improve detection reliability.
Classification
Scanner 80%
Target:
Next.js Middleware
No auth needed
Prerequisites:
Nuclei installed · Target URL running vulnerable Next.js Middleware
nomisec
WORKING POC
2 stars
by yugo-eliatrope · remote
https://github.com/yugo-eliatrope/test-cve-2025-29927
This PoC demonstrates an authentication bypass vulnerability (CVE-2025-29927) in a Next.js application by manipulating middleware headers via a proxy server. The exploit allows unauthorized access to the /admin page by injecting a custom header ('X-Middleware-Subrequest') to bypass authentication checks.
Classification
Working Poc 95%
Target:
Next.js (version not specified)
No auth needed
Prerequisites:
Access to the target Next.js application · Ability to run a proxy server on the same network
nomisec
WRITEUP
1 stars
by kh4sh3i · poc
https://github.com/kh4sh3i/CVE-2025-29927
This repository documents CVE-2025-29927, a Next.js middleware bypass vulnerability where the internal header `x-middleware-subrequest` can be manipulated to bypass authentication and other middleware checks. It includes affected versions, mitigation steps, and exploitation techniques across different Next.js versions.
Classification
Writeup 90%
Target:
Next.js (versions 13.x < 13.5.9, 14.x < 14.2.25, 15.x < 15.2.3)
No auth needed
Prerequisites:
Access to a vulnerable Next.js application · Ability to send HTTP requests with custom headers
nomisec
WORKING POC
1 stars
by w2hcorp · remote
https://github.com/w2hcorp/CVE-2025-29927-PoC
This repository contains a functional Python-based PoC exploit for CVE-2025-29927, which bypasses Next.js middleware authorization by injecting the 'x-middleware-subrequest: middleware' header. The exploit demonstrates unauthorized access to protected routes without authentication.
Classification
Working Poc 95%
Target:
Next.js (versions affected by CVE-2025-29927)
No auth needed
Prerequisites:
Target running vulnerable Next.js version · Access to protected endpoint path
nomisec
SCANNER
1 stars
by pixilated730 · remote
https://github.com/pixilated730/NextJS-Exploit-
This repository contains a scanner for CVE-2025-29927, which targets Next.js applications. It checks for vulnerable versions and attempts to exploit a middleware bypass vulnerability.
Classification
Scanner 90%
Target:
Next.js versions < 14.2.25 and < 15.2.3
No auth needed
Prerequisites:
Wappalyzer · geckodriver · Firefox
nomisec
SCANNER
1 stars
by nocomp · poc
https://github.com/nocomp/CVE-2025-29927-scanner
This repository contains a Python-based scanner for detecting Next.js versions across subdomains to identify potential CVE-2025-29927 vulnerabilities. It enumerates subdomains and checks for affected Next.js versions.
Classification
Scanner 95%
Target:
Next.js versions 11.1.4 to 13.5.6, 14.0.0 to 14.2.25, and 15.0.0 to 15.2.3
No auth needed
Prerequisites:
Domain name to scan · Subdomain enumeration tools (subfinder, dig, host)
nomisec
SCANNER
1 stars
by olimpiofreitas · infoleak
https://github.com/olimpiofreitas/CVE-2025-29927-scanner
This is a scanner for CVE-2025-29927, designed to detect vulnerable Next.js instances by checking version headers and testing for middleware bypass. It includes functionality to scan multiple hosts and routes concurrently.
Classification
Scanner 95%
Target:
Next.js versions 12.x, 13.0-13.5.8
No auth needed
Prerequisites:
List of target hosts · Optional custom routes file
nomisec
WORKING POC
1 stars
by rubbxalc · remote
https://github.com/rubbxalc/CVE-2025-29927
This repository contains a functional exploit for CVE-2025-29927, an authorization bypass vulnerability in Next.js middleware. The exploit sends a crafted HTTP request with the 'x-middleware-subrequest' header to bypass authentication and authorization checks.
Classification
Working Poc 95%
Target:
Next.js versions prior to 15.2.3, 14.2.25, 13.5.9, 12.3.5
No auth needed
Prerequisites:
Vulnerable Next.js application with middleware-based access control
nomisec
WORKING POC
1 stars
by Kamal-418 · poc
https://github.com/Kamal-418/Vulnerable-Lab-NextJS-CVE-2025-29927
This repository demonstrates an authentication bypass vulnerability (CVE-2025-29927) in a Next.js application. The middleware fails to properly validate the 'auth_token' cookie, allowing unauthorized access to the '/admin' route.
Classification
Working Poc 90%
Target:
Next.js 12.2
No auth needed
Prerequisites:
Access to the application's login endpoint · Ability to set arbitrary cookies
nomisec
WORKING POC
1 stars
by nicknisi · remote
https://github.com/nicknisi/next-attack
This PoC demonstrates a middleware bypass vulnerability in Next.js by exploiting the `x-middleware-subrequest` header to bypass redirect logic. The exploit shows how repeated middleware path segments can circumvent the intended redirect behavior.
Classification
Working Poc 90%
Target:
Next.js (version not specified)
No auth needed
Prerequisites:
Access to a vulnerable Next.js application with middleware redirect logic
nomisec
SCANNER
1 stars
by jmbowes · remote
https://github.com/jmbowes/NextSecureScan
This repository contains a Python-based scanner designed to detect CVE-2025-29927, an authorization bypass vulnerability in Next.js middleware. The scanner checks for middleware presence, redirects, and potential bypasses using header manipulation techniques.
Classification
Scanner 95%
Target:
Next.js (versions affected by CVE-2025-29927)
No auth needed
Prerequisites:
Python 3.x · requests · beautifulsoup4 · urllib3 · colorama
nomisec
WORKING POC
1 stars
by alastair66 · poc
https://github.com/alastair66/CVE-2025-29927
This repository demonstrates CVE-2025-29927, a Next.js middleware bypass vulnerability where the internal header 'x-middleware-subrequest' can be manipulated to skip authentication checks. The PoC includes a Dockerized Next.js application with admin and login pages to test the exploit.
Classification
Working Poc 95%
Target:
Next.js versions before 15.2.3, 14.2.25, 13.5.9, 12.3.5
No auth needed
Prerequisites:
Docker · Network access to the target Next.js application
nomisec
WORKING POC
1 stars
by EQSTLab · remote
https://github.com/EQSTLab/CVE-2025-29927
This repository contains a proof-of-concept exploit for CVE-2025-29927, demonstrating an authorization bypass in Next.js middleware by leveraging the `X-Middleware-Subrequest` header. The PoC includes a Docker-based lab setup and a bash script to trigger the vulnerability.
Classification
Working Poc 95%
Target:
Next.js versions 1.11.4 to 15.2.2 (fixed in 12.3.5, 13.5.9, 14.2.25, 15.2.3)
No auth needed
Prerequisites:
Access to a vulnerable Next.js application · Ability to send HTTP requests with custom headers
nomisec
WORKING POC
1 stars
by m2hcz · remote
https://github.com/m2hcz/PoC-for-Next.js-Middleware
This is a proof-of-concept for a Next.js middleware bypass vulnerability (CVE-2025-29927). The PoC sends a crafted HTTP request with a specific header to bypass middleware protection and access protected routes.
Classification
Working Poc 90%
Target:
Next.js (version not specified)
No auth needed
Prerequisites:
Target running Next.js with vulnerable middleware · Network access to the target
nomisec
WORKING POC
1 stars
by kuzushiki · poc
https://github.com/kuzushiki/CVE-2025-29927-test
This repository provides a test application for CVE-2025-29927, demonstrating an authentication bypass vulnerability in Next.js middleware. The middleware fails to properly restrict access to the '/secret' path, allowing unauthorized access.
Classification
Working Poc 90%
Target:
Next.js (specific version not specified)
No auth needed
Prerequisites:
Access to the target application
nomisec
WORKING POC
1 stars
by sermikr0 · poc
https://github.com/sermikr0/nextjs-middleware-auth-bypass
This repository demonstrates an authentication bypass vulnerability in Next.js middleware by exploiting improper cookie validation. The PoC includes a login page that sets cookies, which are then checked by the middleware, allowing bypass with specific credentials.
Classification
Working Poc 90%
Target:
Next.js (version not specified)
No auth needed
Prerequisites:
Access to the login page · Ability to set cookies
nomisec
WORKING POC
1 stars
by lstudlo · poc
https://github.com/lstudlo/nextjs-cve-demo
This repository demonstrates an authorization bypass vulnerability (CVE-2025-29927) in Next.js middleware by exploiting the `x-middleware-subrequest` header to bypass authentication checks. It includes functional exploit code and detailed instructions for reproduction.
Classification
Working Poc 100%
Target:
Next.js (11.1.4 to 13.5.6, 14.x below 14.2.25, 15.x below 15.2.3)
No auth needed
Prerequisites:
Next.js application with middleware-based authentication · Access to send HTTP requests with custom headers
github
WORKING POC
1 stars
by exploitintel · pythonpoc
https://github.com/exploitintel/eip-pocs-and-cves/tree/main/CVE-2025-29927
This repository contains a functional exploit for CVE-2025-29927, an authorization bypass vulnerability in Next.js middleware. The exploit leverages the improper handling of the `x-middleware-subrequest` header to bypass authentication and authorization checks.
Classification
Working Poc 100%
Target:
Next.js 11.1.4 – 12.3.4, 13.0.0 – 13.5.8, 14.0.0 – 14.2.24, 15.0.0 – 15.2.2
No auth needed
Prerequisites:
Next.js application with middleware · Access to the target application
nomisec
WORKING POC
1 stars
by kazuya256 · poc
https://github.com/kazuya256/next-js-auth-bypass
This repository demonstrates an authentication bypass vulnerability (CVE-2025-29927) in Next.js versions 11.1.4 to 15.2.2 by exploiting the `x-middleware-subrequest` header to bypass middleware authentication checks.
Classification
Working Poc 95%
Target:
Next.js 11.1.4 - 15.2.2
No auth needed
Prerequisites:
Access to the target application · Ability to send HTTP requests with custom headers
nomisec
WORKING POC
1 stars
by ricsirigu · poc
https://github.com/ricsirigu/CVE-2025-29927
This repository provides a functional proof-of-concept for CVE-2025-29927, an authorization bypass vulnerability in Next.js middleware. The exploit involves injecting a malformed `x-middleware-subrequest` header to bypass authentication checks.
Classification
Working Poc 100%
Target:
Next.js (versions >= 13.0.0, < 13.5.9; >= 14.0.0, < 14.2.25; >= 15.0.0, < 15.2.3; >= 11.1.4, < 12.3.5)
No auth needed
Prerequisites:
Access to the target Next.js application · Ability to modify HTTP headers in requests
nomisec
SCANNER
1 stars
by moften · poc
https://github.com/moften/CVE-2025-29927_Next.js_Auth_Bypass
This PoC scans for Next.js applications with middleware by analyzing HTTP headers to detect potential vulnerability to CVE-2025-29927, an authentication bypass issue. It does not exploit the vulnerability but identifies indicators of susceptibility.
Classification
Scanner 90%
Target:
Next.js (with middleware)
No auth needed
Prerequisites:
Target must be a Next.js application with middleware enabled
nomisec
WORKING POC
1 stars
by iteride · infoleak
https://github.com/iteride/CVE-2025-29927
The repository provides a detailed writeup and proof-of-concept for CVE-2025-29927, an authentication bypass vulnerability in Next.js middleware. The exploit leverages the `x-middleware-subrequest` header to bypass middleware checks in vulnerable versions.
Classification
Working Poc | Writeup 95%
Target:
Next.js (11.1.4 ≤ version < 12.3.5, 13.0.0 ≤ version < 13.5.9, 14.0.0 ≤ version < 14.2.25, 15.0.0 ≤ version < 15.2.3)
No auth needed
Prerequisites:
Next.js application with middleware-based authentication · Self-hosted deployment or lack of WAF filtering for `x-middleware-subrequest` header
nomisec
SCANNER
1 stars
by liamromanis101 · infoleak
https://github.com/liamromanis101/CVE-2025-29927-NextJS
This repository contains a Python-based scanner for detecting CVE-2025-29927, a vulnerability in Next.js that allows unauthorized access to internal files via crafted URLs. The script checks for version detection and tests endpoints for potential bypasses using the 'x-middleware-subrequest' header.
Classification
Scanner 90%
Target:
Next.js (versions older than 12.3.5, 13.5.9, 14.2.25, 15.2.3)
No auth needed
Prerequisites:
Target running a vulnerable version of Next.js · Network access to the target application
github
WORKING POC
1 stars
by TH-SecForge · pythonremote
https://github.com/TH-SecForge/CVE-2025-29972
The repository contains a functional Python exploit for CVE-2025-29927, which bypasses Next.js middleware authorization by manipulating the `x-middleware-subrequest` header. The exploit sends crafted HTTP requests to test for vulnerability and checks for protected content in responses.
Classification
Working Poc 95%
Target:
Next.js versions prior to 14.2.25 and 15.2.3
No auth needed
Prerequisites:
Network access to the target Next.js application · Knowledge of a protected endpoint path
nomisec
WORKING POC
1 stars
by Bongni · poc
https://github.com/Bongni/CVE-2025-29927
This repository demonstrates an authentication bypass vulnerability (CVE-2025-29927) in Next.js middleware by exploiting the `x-middleware-subrequest` header to bypass token validation. The PoC includes vulnerable and fixed versions for comparison.
Classification
Working Poc 100%
Target:
Next.js (version 15.x)
No auth needed
Prerequisites:
Access to the target application's `/admin` endpoint · Ability to send custom headers in HTTP requests
nomisec
STUB
1 stars
by 0xnxt1me · poc
https://github.com/0xnxt1me/CVE-2025-29927
The provided code snippet is a truncated and obfuscated Next.js build artifact, likely part of a larger repository. It does not contain any exploit logic or proof-of-concept code for CVE-2025-29927.
Target:
Unknown
No auth needed
nomisec
WORKING POC
by Knotsecurity · poc
https://github.com/Knotsecurity/CVE-2025-29927-NextJs-Middleware-Simulation
This repository demonstrates CVE-2025-29927, an authorization bypass in Next.js middleware via the `x-middleware-subrequest` header. The PoC includes a simulated Next.js app with protected routes and shows how adding the header bypasses authentication checks.
Classification
Working Poc 95%
Target:
Next.js (versions before 12.3.5, 13.5.9, 14.2.25, 15.2.3)
No auth needed
Prerequisites:
Access to a vulnerable Next.js application · Ability to send HTTP requests with custom headers
nomisec
WORKING POC
by Gokul-Krishnan-V-R · poc
https://github.com/Gokul-Krishnan-V-R/cve-2025-29927
This PoC demonstrates an authentication bypass in Next.js middleware by exploiting the `x-middleware-subrequest` header to bypass middleware logic. The vulnerability allows unauthenticated access to protected routes by manipulating the header value.
Classification
Working Poc 90%
Target:
Next.js 14.0.4
No auth needed
Prerequisites:
Next.js application with middleware configured · Access to send custom headers (e.g., via Burp Suite or browser extensions)
nomisec
WORKING POC
by fahimalshihab · poc
https://github.com/fahimalshihab/NextBypass
NextBypass is a tool designed to exploit CVE-2025-29927, an authorization bypass vulnerability in Next.js Middleware via the `x-middleware-subrequest` header. It includes features for terminal and browser-based exploitation, vulnerability scanning, and network monitoring.
Classification
Working Poc 90%
Target:
Next.js (version not specified)
No auth needed
Prerequisites:
Access to a vulnerable Next.js application · Ability to send crafted HTTP headers
nomisec
WORKING POC
by 0xPb1 · poc
https://github.com/0xPb1/Next.js-CVE-2025-29927
This repository demonstrates an authentication bypass vulnerability in Next.js 12.2 (CVE-2025-29927) via middleware manipulation. The PoC includes a Dockerized Next.js app with hardcoded credentials and middleware logic that can be bypassed.
Classification
Working Poc 90%
Target:
Next.js 12.2
No auth needed
Prerequisites:
Docker or Node.js environment · Access to the target application
nomisec
WORKING POC
by Naveen-005 · poc
https://github.com/Naveen-005/Next.Js-middleware-bypass-vulnerability-CVE-2025-29927
This PoC demonstrates a middleware bypass vulnerability in Next.js 15.2.2 (CVE-2025-29927) by adding a specific header (`x-middleware-subrequest`) to bypass authentication and access the admin page.
Classification
Working Poc 90%
Target:
Next.js 15.2.2
No auth needed
Prerequisites:
Next.js application with middleware-based authentication
nomisec
STUB
by pickovven · poc
https://github.com/pickovven/vulnerable-nextjs-14-CVE-2025-29927
The repository contains only a README.md file with minimal content, providing no exploit code, technical details, or proof-of-concept for CVE-2025-29927. It appears to be a placeholder or incomplete submission.
Target:
Next.js 14 (assumed from title)
No auth needed
nomisec
SCANNER
by darklotuskdb · poc
https://github.com/darklotuskdb/nextjs-CVE-2025-29927-hunter
This repository contains a Python-based scanner that automates Shodan searches to identify assets potentially vulnerable to CVE-2025-29927 in Next.js deployments. It filters IPs/domains and uses Nuclei for vulnerability detection.
Classification
Scanner 90%
Target:
Next.js deployments
No auth needed
Prerequisites:
Shodan API access · Nuclei installed · Nuclei template for CVE-2025-29927
nomisec
WORKING POC
by DanielHallbro · poc
https://github.com/DanielHallbro/CVE-2025-29927-Nextjs-Bypass-PoC
This PoC demonstrates a middleware bypass vulnerability in Next.js (CVE-2025-29927) by exploiting the `x-middleware-subrequest` header to skip security checks. The exploit involves sending a crafted HTTP request with the internal header to bypass authentication or other middleware logic.
Classification
Working Poc 100%
Target:
Next.js versions 1.11.4 and prior to 12.3.5, 13.5.9, 14.2.25, and 15.2.3
No auth needed
Prerequisites:
Access to a vulnerable Next.js application · Ability to send HTTP requests with custom headers
nomisec
WORKING POC
by 0xcucumbersalad · poc
https://github.com/0xcucumbersalad/cve-2025-29927
This PoC demonstrates an authentication bypass vulnerability in a Next.js application by exploiting middleware subrequest handling. The attacker can bypass the middleware restriction by sending a crafted header to access the `/api/flag` endpoint.
Classification
Working Poc 90%
Target:
Next.js (version not specified)
No auth needed
Prerequisites:
Access to the target application
nomisec
WORKING POC
by rgvillanueva28 · poc
https://github.com/rgvillanueva28/vulnbox-easy-CVE-2025-29927
This repository contains a proof-of-concept for CVE-2025-29927, demonstrating a vulnerability in Next.js middleware where improper JWT validation allows unauthorized access to protected routes. The flag is exposed via an API endpoint that should require admin privileges.
Classification
Working Poc 90%
Target:
Next.js (with custom middleware and JWT authentication)
Auth required
Prerequisites:
Access to the application · Valid JWT token manipulation
nomisec
WORKING POC
by amalpvatayam67 · poc
https://github.com/amalpvatayam67/day10-nextjs-middleware-lab
This repository contains a working proof-of-concept for CVE-2025-29927, demonstrating an authentication bypass vulnerability in Next.js middleware. The exploit leverages a flawed header check that allows bypassing authentication by sending an 'x-token' header containing the string 'admin'.
Classification
Working Poc 100%
Target:
Next.js (version not specified)
No auth needed
Prerequisites:
Access to the target application · Ability to send custom HTTP headers
nomisec
WORKING POC
by enochgitgamefied · poc
https://github.com/enochgitgamefied/NextJS-CVE-2025-29927
This repository contains a vulnerable Next.js application demonstrating CVE-2025-29927, which involves authentication bypass or improper access control. The PoC includes a MySQL backend and JWT authentication, with intentionally weak configurations for educational purposes.
Classification
Working Poc 90%
Target:
Next.js 13.4.9
No auth needed
Prerequisites:
Node.js v18+ · MySQL Server · Git
nomisec
WRITEUP
by elshaheedy · poc
https://github.com/elshaheedy/CVE-2025-29927-Sigma-Rule
This repository provides a detailed writeup on CVE-2025-29927, an authentication bypass vulnerability in Next.js middleware. It explains the exploitation method via the `x-middleware-subrequest` header and discusses detection and mitigation strategies.
Classification
Writeup 90%
Target:
Next.js (version not specified)
No auth needed
Prerequisites:
Access to send HTTP requests to the target Next.js application
nomisec
WORKING POC
by R3verseIN · poc
https://github.com/R3verseIN/Nextjs-middleware-vulnerable-appdemo-CVE-2025-29927
This repository contains a vulnerable Next.js application demonstrating CVE-2025-29927, an authorization bypass vulnerability in Next.js middleware. The middleware incorrectly checks for a 'loggedin' cookie, allowing unauthenticated access to protected routes.
Classification
Working Poc 90%
Target:
Next.js 13.x
No auth needed
Prerequisites:
Access to the application's endpoint
nomisec
STUB
by serhalp · poc
https://github.com/serhalp/test-cve-2025-29927
The repository contains a basic Next.js project with a middleware file that sets custom headers. No exploit code or vulnerability details are present.
Target:
Next.js (version unspecified)
No auth needed
Prerequisites:
None
nomisec
WRITEUP
by BilalGns · poc
https://github.com/BilalGns/CVE-2025-29927
This repository contains a README file referencing CVE-2025-29927, a vulnerability in Next.js, with a link to a detailed writeup. No exploit code or technical details are provided in the repository itself.
Classification
Writeup 90%
Target:
Next.js (version unspecified)
No auth needed
Prerequisites:
Access to the referenced external writeup for details
nomisec
WORKING POC
by JOOJIII · poc
https://github.com/JOOJIII/CVE-2025-29927
This repository demonstrates an authentication bypass vulnerability in Next.js 15.2.0, allowing unauthorized access to the admin dashboard by bypassing middleware checks. The PoC includes a functional Next.js application with login and dashboard components to showcase the flaw.
Classification
Working Poc 90%
Target:
Next.js 15.2.0
No auth needed
Prerequisites:
Next.js 15.2.0 application with vulnerable middleware configuration
nomisec
WORKING POC
by yuzu-juice · poc
https://github.com/yuzu-juice/CVE-2025-29927_demo
This PoC demonstrates an authentication bypass vulnerability in Next.js middleware by exploiting a header injection flaw. The exploit uses a malformed 'x-middleware-subrequest' header to bypass the authentication check in the middleware.
Classification
Working Poc 90%
Target:
Next.js (version not specified)
No auth needed
Prerequisites:
Access to the target application · Ability to send crafted HTTP headers
gitlab
WORKING POC
by ThemeHackers · poc
https://gitlab.com/ThemeHackers/CVE-2025-29972
The repository contains a functional Python exploit for CVE-2025-29927, which bypasses Next.js middleware authorization checks by manipulating the `x-middleware-subrequest` header. The exploit sends crafted HTTP requests to test for vulnerability and checks for protected content in responses.
Classification
Working Poc 95%
Target:
Next.js versions prior to 14.2.25 and 15.2.3
No auth needed
Prerequisites:
Target Next.js application with vulnerable middleware · Network access to the target
nomisec
SCANNER
by ticofookfook · remote
https://github.com/ticofookfook/poc-nextjs-CVE-2025-29927
This repository contains a Python-based scanner for detecting CVE-2025-29927, a middleware bypass vulnerability in Next.js applications. The tool tests multiple payloads targeting different Next.js versions by sending HTTP requests with manipulated `x-middleware-subrequest` headers.
Classification
Scanner 95%
Target:
Next.js (versions before 14.2.25 and 15.2.3)
No auth needed
Prerequisites:
Network access to the target Next.js application
nomisec
SCANNER
by iSee857 · remote
https://github.com/iSee857/CVE-2025-29927
This repository contains a Python-based scanner for detecting CVE-2025-29927, a Next.js permission bypass vulnerability. The tool checks for the presence of the vulnerability by comparing HTTP responses with and without the 'x-middleware-subrequest' header.
Classification
Scanner 90%
Target:
Next.js (version not specified)
No auth needed
Prerequisites:
Target URL or list of URLs · Network access to the target
nomisec
WORKING POC
by jeymo092 · remote
https://github.com/jeymo092/cve-2025-29927
This repository contains a working proof-of-concept for CVE-2025-29927, an authentication bypass vulnerability in Next.js. The exploit leverages the `x-middleware-subrequest` header to bypass middleware-based access controls.
Classification
Working Poc 95%
Target:
Next.js versions 11.1.4 through 13.5.6, 14.x before 14.2.25, and 15.x before 15.2.3
No auth needed
Prerequisites:
Access to a vulnerable Next.js application
nomisec
WORKING POC
by maronnjapan · remote
https://github.com/maronnjapan/claude-create-CVE-2025-29927
This repository contains a functional proof-of-concept for CVE-2025-29927, an authorization bypass vulnerability in Next.js middleware. The exploit demonstrates how the `x-middleware-subrequest` header can bypass authentication checks, allowing unauthorized access to protected routes and API endpoints.
Classification
Working Poc 95%
Target:
Next.js (versions before 15.2.3, 14.2.25, 13.5.9, 12.3.5)
No auth needed
Prerequisites:
A running Next.js application with vulnerable middleware · Network access to the target application
nomisec
SCANNER
by aleongx · remote
https://github.com/aleongx/CVE-2025-29927_Scanner
This is a scanner for CVE-2025-29927, a vulnerability in Next.js that allows bypassing security restrictions via manipulated `x-middleware-subrequest` headers. It tests multiple payloads to detect unauthorized access to sensitive routes.
Classification
Scanner 90%
Target:
Next.js (version not specified)
No auth needed
Prerequisites:
Target URL running Next.js · Network access to the target
nomisec
WORKING POC
by Heimd411 · remote
https://github.com/Heimd411/CVE-2025-29927-PoC
This repository contains a functional PoC for CVE-2025-29927, an authentication bypass vulnerability in Next.js middleware. The exploit manipulates the `x-middleware-subrequest` header to bypass security controls in vulnerable versions.
Classification
Working Poc 95%
Target:
Next.js (versions 15.0.0-15.2.2, others with specific conditions)
No auth needed
Prerequisites:
Target running vulnerable Next.js version · Access to protected endpoint
nomisec
WORKING POC
by dante01yoon · remote
https://github.com/dante01yoon/CVE-2025-29927
This repository demonstrates CVE-2025-29927, an authentication bypass vulnerability in Next.js versions 15.2.2 and earlier. The PoC shows how attackers can spoof the `x-middleware-subrequest` header to bypass middleware authentication checks.
Classification
Working Poc 95%
Target:
Next.js versions 15.2.2 and earlier
No auth needed
Prerequisites:
Access to a vulnerable Next.js application · Ability to send HTTP requests with custom headers
nomisec
WORKING POC
by sn1p3rt3s7 · remote
https://github.com/sn1p3rt3s7/NextJS_CVE-2025-29927
This repository demonstrates an authentication bypass vulnerability in Next.js 13.4.19 via the `x-middleware-subrequest` header. The PoC includes a middleware configuration that can be bypassed by crafting a specific header value, allowing unauthorized access to protected routes.
Classification
Working Poc 95%
Target:
Next.js 13.4.19
No auth needed
Prerequisites:
Access to the target Next.js application · Ability to send HTTP requests with custom headers
nomisec
SCANNER
by Balajih4kr · remote
https://github.com/Balajih4kr/cve-2025-29927
The repository contains a bash script that checks for CVE-2025-29927, an authorization bypass vulnerability in Next.js middleware by testing the response codes of requests with and without the 'x-middleware-subrequest' header.
Classification
Scanner 90%
Target:
Next.js (version not specified)
No auth needed
Prerequisites:
Access to the target URL · curl installed on the system
nomisec
WORKING POC
by YEONDG · remote
https://github.com/YEONDG/nextjs-cve-2025-29927
This repository demonstrates CVE-2025-29927, a middleware bypass vulnerability in Next.js versions 15.x < 15.2.3, 14.x < 14.2.25, and 13.x < 13.5.9. The PoC shows how the `x-middleware-subrequest` header can bypass authentication middleware in vulnerable versions.
Classification
Working Poc 95%
Target:
Next.js 15.x < 15.2.3, 14.x < 14.2.25, 13.x < 13.5.9
No auth needed
Prerequisites:
Access to a vulnerable Next.js application with middleware-based authentication
nomisec
WORKING POC
by l1uk · remote
https://github.com/l1uk/nextjs-middleware-exploit
This repository demonstrates an authorization bypass vulnerability in Next.js middleware (CVE-2025-29927) by exploiting the `x-middleware-subrequest` header to bypass authentication checks. The PoC includes a vulnerable Next.js app and an exploit script to test the vulnerability.
Classification
Working Poc 95%
Target:
Next.js versions 11.1.4 through 15.1.7
No auth needed
Prerequisites:
Access to a vulnerable Next.js application · Ability to send HTTP requests with custom headers
nomisec
WORKING POC
by ethanol1310 · remote
https://github.com/ethanol1310/POC-CVE-2025-29927-
This PoC demonstrates an authentication bypass in Next.js middleware by exploiting a vulnerability in how the `x-middleware-subrequest` header is processed, allowing unauthorized access to protected routes like `/dashboard`. The exploit involves sending a crafted request with a repeated header value to bypass the middleware's token check.
Classification
Working Poc 90%
Target:
Next.js 15.x < 15.2.3, 14.x < 14.2.25, 13.x < 13.5.9
No auth needed
Prerequisites:
Target must be using Next.js with middleware for authentication · Access to the target application's endpoint
nomisec
WORKING POC
by mhamzakhattak · remote
https://github.com/mhamzakhattak/CVE-2025-29927
This repository contains a functional PoC for CVE-2025-29927, demonstrating an authorization bypass in Next.js middleware. The exploit leverages a crafted header (`x-middleware-subrequest: middleware`) to bypass authentication and access the protected `/protected` route.
Classification
Working Poc 95%
Target:
Next.js (version not specified, likely 12.2 based on context)
No auth needed
Prerequisites:
Target Next.js application with vulnerable middleware · Access to the `/protected` endpoint
nomisec
SCANNER
by Hirainsingadia · remote
https://github.com/Hirainsingadia/CVE-2025-29927
This script tests for CVE-2025-29927, an authentication bypass vulnerability in Next.js middleware, by sending various HTTP requests with manipulated headers to check for unauthorized access.
Classification
Scanner 90%
Target:
Next.js middleware (version not specified)
No auth needed
Prerequisites:
Network access to the target application
nomisec
STUB
by EarthAngel666 · infoleak
https://github.com/EarthAngel666/x-middleware-exploit
This script sends repeated HTTP requests with specific headers targeting Next.js middleware endpoints. It lacks exploit payloads or clear vulnerability demonstration, making it a basic stub or scanner.
Target:
Next.js (version unspecified)
No auth needed
Prerequisites:
Target URL with Next.js middleware endpoints
nomisec
WORKING POC
by enochgitgamefied · remote
https://github.com/enochgitgamefied/NextJS-CVE-2025-29927-Docker-Lab
This repository provides a Docker-based lab environment to demonstrate CVE-2025-29927, an authorization bypass vulnerability in Next.js middleware. The exploit involves manipulating the `X-Middleware-Subrequest` header to bypass authentication and access protected routes.
Classification
Working Poc 95%
Target:
Next.js (versions prior to 14.2.25 and 15.2.3)
No auth needed
Prerequisites:
Docker · Next.js application with vulnerable middleware
nomisec
SCANNER
by sagsooz · remote
https://github.com/sagsooz/CVE-2025-29927
This repository contains a Python-based scanner for detecting CVE-2025-29927, a Next.js middleware bypass vulnerability. The tool tests multiple crafted headers to identify if the target application is vulnerable to authentication bypass.
Classification
Scanner 95%
Target:
Next.js (versions prior to 15.2.3, 14.2.25, 13.5.7)
No auth needed
Prerequisites:
Target URL and protected path · Network access to the target application
nomisec
WORKING POC
by SugiB3o · remote
https://github.com/SugiB3o/vulnerable-nextjs-14-CVE-2025-29927
This repository demonstrates an authorization bypass vulnerability (CVE-2025-29927) in Next.js 14 by exploiting the `x-middleware-subrequest` header to bypass middleware authentication checks. The PoC includes a vulnerable Next.js application and instructions to reproduce the issue.
Classification
Working Poc 95%
Target:
Next.js 14 (and older versions with _middleware.js)
No auth needed
Prerequisites:
Access to a vulnerable Next.js application · Ability to send HTTP requests with custom headers
nomisec
SCANNER
by amitlttwo · remote
https://github.com/amitlttwo/Next.JS-CVE-2025-29927
This repository contains a Go-based scanner for detecting Next.js applications vulnerable to CVE-2025-29927, an authentication bypass vulnerability. The tool performs version detection and verification but does not include an exploit payload.
Classification
Scanner 95%
Target:
Next.js versions 11.1.4-13.5.6, 14.0.0-14.2.24, 15.0.0-15.2.2
No auth needed
Prerequisites:
Network access to the target Next.js application
nomisec
WORKING POC
by mickhacking · infoleak
https://github.com/mickhacking/Thank-u-Next
This repository contains a functional exploit for CVE-2025-29927, which bypasses authentication by injecting the `x-middleware-subrequest: middleware` header into HTTP requests. The script supports multiple HTTP methods and checks for successful bypass via response status codes.
Classification
Working Poc 95%
Target:
Middleware-based web applications (unspecified version)
No auth needed
Prerequisites:
Target application must trust the `x-middleware-subrequest` header for authentication bypass
nomisec
WORKING POC
by zs1n · infoleak
https://github.com/zs1n/CVE-2025-29927
This PoC exploits CVE-2025-29927, an authentication bypass vulnerability in Next.js Middleware versions prior to 12.3.5, 13.5.9, 14.2.25, and 15.2.3. The exploit sends a crafted `x-middleware-subrequest` header to bypass middleware logic, allowing unauthorized access to protected routes.
Classification
Working Poc 90%
Target:
Next.js Middleware < 12.3.5, 13.5.9, 14.2.25, 15.2.3
No auth needed
Prerequisites:
Target URL with vulnerable Next.js Middleware
nomisec
WORKING POC
by MKIRAHMET · infoleak
https://github.com/MKIRAHMET/CVE-2025-29927-PoC
This PoC demonstrates a path traversal vulnerability (CVE-2025-29927) by exploiting middleware misconfiguration to access unauthorized files. It compares baseline and modified HTTP responses to detect vulnerability patterns without executing malicious payloads.
Classification
Working Poc 90%
Target:
Web applications with vulnerable middleware handling (specific software not explicitly named)
No auth needed
Prerequisites:
Target domain with vulnerable middleware configuration · Network access to the target
nomisec
WORKING POC
by adjscent · infoleak
https://github.com/adjscent/vulnerable-nextjs-14-CVE-2025-29927
This repository demonstrates an authorization bypass vulnerability (CVE-2025-29927) in Next.js 14 by exploiting the `x-middleware-subrequest` header to bypass middleware authentication checks. The PoC includes a vulnerable Next.js application and instructions to reproduce the issue.
Classification
Working Poc 100%
Target:
Next.js 14 (and older versions with _middleware.js)
No auth needed
Prerequisites:
Access to the target Next.js application · Ability to send HTTP requests with custom headers
nomisec
WORKING POC
by Si-Ni · remote
https://github.com/Si-Ni/CVE-2025-29927-Proof-of-Concept
This repository contains a proof-of-concept exploit for CVE-2025-29927, demonstrating a middleware bypass in Next.js via the `x-middleware-subrequest` header and a command injection vulnerability through malicious filenames in an image upload feature.
Classification
Working Poc 95%
Attack Type
Auth Bypass | Rce
Target:
Next.js 15.2.2
No auth needed
Prerequisites:
Network access to the target · Next.js application with vulnerable middleware and file upload functionality
nomisec
WORKING POC
by ValGrace · poc
https://github.com/ValGrace/middleware-auth-bypass
This repository contains a proof-of-concept for an authentication bypass vulnerability in a Next.js middleware. The exploit demonstrates how improper route handling and user validation can be bypassed to access admin routes without proper credentials.
Classification
Working Poc 90%
Target:
Next.js middleware (version not specified)
No auth needed
Prerequisites:
Access to the target application's login or admin routes
nomisec
WORKING POC
by Grand-Moomin · remote
https://github.com/Grand-Moomin/Vuln-Next.js-CVE-2025-29927
This repository demonstrates an authentication bypass vulnerability (CVE-2025-29927) in a Next.js application using middleware manipulation. The exploit involves sending a crafted header to bypass JWT verification and access protected routes.
Classification
Working Poc 90%
Target:
Next.js (version 14.2.23 or similar)
No auth needed
Prerequisites:
Access to the target application · Ability to send HTTP requests with custom headers
nomisec
WRITEUP
by sdrtba · infoleak
https://github.com/sdrtba/CVE-2025-29927
This repository contains a detailed writeup and proof-of-concept for CVE-2025-29927, an authorization bypass vulnerability in Next.js middleware. The vulnerability allows attackers to bypass authorization checks by spoofing the `x-middleware-subrequest` header.
Classification
Writeup 90%
Target:
Next.js (versions >= 11.1.4 and < 12.3.5, >= 13.0.0 and < 13.5.9, >= 14.0.0 and < 14.2.25, >= 15.0.0 and < 15.2.3)
No auth needed
Prerequisites:
Target application using vulnerable Next.js versions · Middleware implementing authorization checks
nomisec
WRITEUP
by b4sh0xf · infoleak
https://github.com/b4sh0xf/PoC-CVE-2025-29927
This repository describes an authentication bypass vulnerability in Next.js 15.0.0 via the `x-middleware-subrequest` header, allowing unauthorized access to protected routes. The PoC demonstrates bypassing middleware checks by manipulating the header value.
Classification
Writeup 80%
Target:
Next.js 15.0.0
No auth needed
Prerequisites:
Access to the target Next.js application · Knowledge of protected routes
nomisec
WORKING POC
by 0xPThree · poc
https://github.com/0xPThree/next.js_cve-2025-29927
This repository contains a functional proof-of-concept for CVE-2025-29927, an authentication bypass vulnerability in Next.js middleware. The exploit leverages the `x-middleware-subrequest` header to bypass authentication checks and access restricted routes like `/admin`.
Classification
Working Poc 95%
Target:
Next.js versions >= 15.0.0, < 15.2.3; >= 14.0.0, < 14.2.25; >= 13.0.0, < 13.5.9; >= 11.1.4, < 12.3.5
No auth needed
Prerequisites:
Access to the target Next.js application · Ability to send HTTP requests with custom headers
nomisec
WORKING POC
by sahbaazansari · poc
https://github.com/sahbaazansari/CVE-2025-29927
This PoC demonstrates an authentication bypass vulnerability in Next.js middleware (CVE-2025-29927) by testing routes on www.m6.fr with and without the 'x-middleware-subrequest' header to detect unauthorized access to protected content.
Classification
Working Poc 90%
Target:
Next.js middleware
No auth needed
Prerequisites:
Network access to the target server · Target server running vulnerable Next.js middleware
github
WORKING POC
by enciphers-team · pythonpoc
https://github.com/enciphers-team/cve-exploits/tree/main/cve-2025-29927.py
The repository contains functional exploit code for CVE-2025-29927, demonstrating an authentication bypass vulnerability in Really Simple SSL. The exploit sends a crafted POST request to skip onboarding and potentially gain unauthorized access.
Classification
Working Poc 90%
Target:
Really Simple SSL (WordPress plugin)
No auth needed
Prerequisites:
Target URL · User ID
nomisec
WORKING POC
by furmak331 · poc
https://github.com/furmak331/CVE-2025-29927
This repository demonstrates CVE-2025-29927, a critical Next.js middleware bypass vulnerability. The PoC includes a vulnerable Next.js app, an exploit script, and mitigation techniques.
Classification
Working Poc 95%
Target:
Next.js 15.x before 15.2.3, Next.js 14.x before 14.2.25, Next.js 11.1.4 through 13.5.6
No auth needed
Prerequisites:
Access to a vulnerable Next.js application
nomisec
WRITEUP
by dedibagus · poc
https://github.com/dedibagus/cve-2025-29927-poc
This repository provides a detailed writeup and proof-of-concept for CVE-2025-29927, demonstrating an authentication bypass via a custom HTTP header (`X-Middleware-Subrequest`) to access restricted content. The PoC includes step-by-step HTTP requests and responses, but no executable exploit code.
Classification
Writeup 90%
Target:
Middleware handling within a web application (e.g., Nginx with Next.js)
No auth needed
Prerequisites:
A target server running vulnerable middleware configuration · An HTTP client tool like `curl` or Burp Suite
nomisec
WRITEUP
by N3k0t-dev · poc
https://github.com/N3k0t-dev/bughunter-cyber-intel-dashboard
This repository appears to be a writeup or documentation for a cybersecurity threat intelligence dashboard mentioning CVE-2025-29927 among other vulnerabilities. No actual exploit code is present in the provided files.
Classification
Writeup 90%
Target:
bughunter-cyber-intel-dashboard
No auth needed
Prerequisites:
access to the dashboard or related documentation
nomisec
SCANNER
by w3shinew · poc
https://github.com/w3shinew/CVE-2025-29927
This repository contains a Nuclei template for detecting CVE-2025-29927, a Next.js middleware bypass vulnerability. It checks for the presence of specific headers and attempts to bypass middleware by sending a crafted 'X-Middleware-Subrequest' header.
Classification
Scanner 90%
Target:
Next.js versions 11.1.4 through 15.2.2
No auth needed
Prerequisites:
Target must be running a vulnerable version of Next.js · Target must have middleware configured
github
WRITEUP
by lucaschanzx · typescriptpoc
https://github.com/lucaschanzx/CVE-2025-29927-PoC
This repository provides a detailed comparison between vulnerable and patched versions of a Next.js application, demonstrating the middleware authentication bypass vulnerability (CVE-2025-29927). It includes Docker configurations for both versions, allowing researchers to analyze the differences in behavior.
Classification
Writeup 90%
Target:
Next.js (versions 15.0.0 and 15.2.3)
No auth needed
Prerequisites:
Access to the target Next.js application · Ability to send crafted HTTP requests
nomisec
SUSPICIOUS
by 0xb1lal · poc
https://github.com/0xb1lal/CVE-2025-29927
The repository contains no exploit code or technical details, only a link to an external blog post. This is characteristic of a social engineering lure.
Classification
Suspicious 90%
Target:
Next.js (version unspecified)
No auth needed
nomisec
WORKING POC
by ayato-shitomi · poc
https://github.com/ayato-shitomi/WebLab_CVE-2025-29927
This repository contains a proof-of-concept for CVE-2025-29927, an authentication bypass vulnerability in Next.js 15.2.2. The exploit demonstrates how to bypass authentication checks in the middleware by manipulating the request path or cookies.
Classification
Working Poc 90%
Target:
Next.js 15.2.2
No auth needed
Prerequisites:
Access to the target Next.js application · Knowledge of the vulnerable endpoint structure
exploitdb
WORKING POC
by kOaDT · textwebappsmultiple
https://www.exploit-db.com/exploits/52124
This exploit targets a middleware bypass vulnerability in Next.js, allowing unauthorized access to protected routes. The PoC demonstrates how to bypass middleware restrictions by manipulating request headers or paths.
Classification
Working Poc 90%
Target:
Next.js versions 13.0.0-13.5.8, 14.0.0-14.2.24, 15.0.0-15.2.2, and 11.1.4-12.3.4
No auth needed
Prerequisites:
Access to a vulnerable Next.js application · Ability to send crafted HTTP requests
vulncheck_xdb
SUSPICIOUS
remote
https://github.com/goncalocsousa1/CVE-2025-29927
The repository contains Next.js build artifacts and no actual exploit code or technical details about CVE-2025-29927. The files are obfuscated and lack meaningful content related to the vulnerability.
Classification
Suspicious 90%
Target:
unknown
No auth needed
vulncheck_xdb
SCANNER
remote
https://github.com/moften/CVE-2025-29927
The repository contains a Python script that scans for Next.js applications with middleware by analyzing HTTP headers, indicating potential susceptibility to CVE-2025-29927, an authentication bypass vulnerability. It does not exploit the vulnerability but detects indicators of its presence.
Classification
Scanner 90%
Target:
Next.js (with middleware)
No auth needed
Prerequisites:
Target URL · Next.js application with middleware
vulncheck_xdb
WORKING POC
infoleak
https://github.com/aayush256-sys/next-js-auth-bypass
This repository contains a functional Next.js application demonstrating CVE-2025-29927, an authentication bypass vulnerability via the `x-middleware-subrequest` header. The middleware logic is intentionally flawed to allow bypass, and the README provides clear exploit methods.
Classification
Working Poc 95%
Target:
Next.js 11.1.4 - 15.2.2
No auth needed
Prerequisites:
Next.js application with vulnerable middleware
vulncheck_xdb
SCANNER
infoleak
https://github.com/takumade/ghost-route
This repository contains a Python script that scans for CVE-2025-29927, a Next.js middleware vulnerability allowing authentication bypass via the `x-middleware-subrequest` header. It tests multiple payloads to detect potential bypasses but does not exploit the vulnerability beyond detection.
Classification
Scanner 95%
Target:
Next.js (versions 11.1.4 and above)
No auth needed
Prerequisites:
Target must be a Next.js application with vulnerable middleware
vulncheck_xdb
SCANNER
infoleak
https://github.com/diogolourencodev/middleforce
The repository contains a Python-based tool designed to detect CVE-2025-29927, a vulnerability in Next.js middleware that allows bypassing protections via manipulated HTTP headers. It tests routes by sending requests with and without specific headers to determine vulnerability status.
Classification
Scanner 90%
Target:
Next.js middleware
No auth needed
Prerequisites:
Python 3.x · requests library · colorama library · target URL with Next.js middleware
vulncheck_xdb
WORKING POC
infoleak
https://github.com/AventurineJun/CVE-2025-29927-Research
This repository contains a functional PoC for CVE-2025-29927, demonstrating a Next.js middleware bypass vulnerability. The exploit sends HTTP requests with specific headers to test for unauthorized access to protected routes.
Classification
Working Poc 90%
Target:
Next.js (version not specified)
No auth needed
Prerequisites:
Next.js application with middleware protection · Access to the target server
vulncheck_xdb
SCANNER
remote
https://github.com/Slvignesh05/CVE-2025-29927
This repository contains a Nuclei template for detecting CVE-2025-29927, a Next.js middleware bypass vulnerability. It checks for the presence of specific headers and attempts to bypass middleware by sending a crafted 'X-Middleware-Subrequest' header.
Classification
Scanner 90%
Target:
Next.js versions 11.1.4 through 15.2.2
No auth needed
Prerequisites:
Target must be running a vulnerable version of Next.js · Target must expose endpoints with middleware