next is vulnerable to Authentication Bypass
75
High Risk
Pages Router deployments with i18n can expose locale-less data routes that skip middleware checks. An attacker can request internal JSON data endpoints for protected pages without the expected authorization gate. This enables alternate-path access to protected page data. The fix updates matcher behavior so i18n data routes receive equivalent middleware matching.
You are affected if you are using a version that falls within the vulnerable range.
next is vulnerable to Authentication Bypass in versions 12.2.0 - 15.5.15 and 16.0.0 - 16.2.4.
Upgrade the next library to the patch version.
Connect your repositories to instantly see whether vulnerable or malicious packages exist in your codebase.
Free. No credit card required.

SOC 2Compliant
ISO 27001Compliant