Intel

AIKIDO-2026-10761

next is vulnerable to Authentication Bypass

Authentication BypassGHSA-267c-6grr-h53f

75

High Risk

This Affects:

JSnext
15.2.0 - 15.5.15
Fixed in 15.5.16
16.0.0 - 16.2.4
Fixed in 16.2.5
Are you affected? Scan for Free

TL;DR

App Router transport-specific segment-prefetch route variants can bypass middleware or proxy authorization checks. Crafted request paths can reach protected content without hitting expected matcher logic. This creates an alternate access path that weakens route-level protection assumptions. The fix includes transport variants in matcher generation so authorization checks apply consistently.

Who does this affect?

You are affected if you are using a version that falls within the vulnerable range.

Background info

next is vulnerable to Authentication Bypass in versions 15.2.0 - 15.5.15 and 16.0.0 - 16.2.4.

How to fix this

Upgrade the next library to the patch version.