Changeflow GovPing Data Privacy & Cybersecurity Vercel Next.js Vulnerabilities Allow DoS or Sec...
Priority review Notice Amended Final

Vercel Next.js Vulnerabilities Allow DoS or Security Bypass

Favicon for wid.cert-bund.de CERT-Bund Security Advisories
Published March 16th, 2026
Detected March 17th, 2026
Email

Summary

CERT-Bund has issued a security advisory for Vercel Next.js, detailing vulnerabilities that could allow remote attackers to perform Denial of Service attacks or bypass security measures. The advisory affects versions prior to 16.1.7 and 15.5.13, with a CVSS base score of 6.5.

What changed

CERT-Bund has released security advisory WID-SEC-2026-0748 concerning multiple vulnerabilities in Vercel Next.js. These vulnerabilities, with a CVSS base score of 6.5, can be exploited by remote, anonymous attackers to conduct Denial of Service (DoS) attacks or bypass security controls. The advisory specifically impacts Next.js versions prior to 16.1.7 and 15.5.13, and is applicable across UNIX and Windows operating systems.

Organizations utilizing affected versions of Vercel Next.js should immediately update to a patched version to mitigate the risks of DoS attacks and security bypass. While the advisory does not specify a compliance deadline, prompt patching is crucial to prevent potential service disruptions and security breaches. Failure to address these vulnerabilities could lead to significant operational downtime and compromise sensitive data.

What to do next

  1. Update Vercel Next.js to a version greater than or equal to 16.1.7 or 15.5.13.
  2. Review system logs for any signs of exploitation related to these vulnerabilities.

Source document (simplified)

[WID-SEC-2026-0748] Vercel Next.js: Mehrere Schwachstellen CVSS Base Score 6.5 (mittel) CVSS Temporal Score 5.7 (mittel) Remoteangriff ja Datum 16.03.2026 Stand 17.03.2026 Mitigation ja

Betroffene Systeme

Betriebssystem

  • Sonstiges
  • UNIX
  • Windows

Produktbeschreibung

Next.js ist ein Framework für React-basierte Web-Anwendungen.

Produkte

16.03.2026
- Vercel Next.js <16.1.7

  • Vercel Next.js <15.5.13

Angriff

Angriff

Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Vercel Next.js ausnutzen, um einen Denial of Service Angriff durchzuführen oder Sicherheitsmaßnahmen zu umgehen. CVE Informationen Versionshistorie Feedback zum Advisory geben

Source

Analysis generated by AI. Source diff and links are from the original.

Classification

Agency
CERT-Bund
Published
March 16th, 2026
Instrument
Notice
Legal weight
Non-binding
Stage
Final
Change scope
Substantive

Who this affects

Applies to
Technology companies
Geographic scope
de

Taxonomy

Primary area
Cybersecurity
Operational domain
IT Security
Topics
Software Vulnerabilities Denial of Service Web Application Security

Get Data Privacy & Cybersecurity alerts

Weekly digest. AI-summarized, no noise.

Free. Unsubscribe anytime.

Get alerts for this source

We'll email you when CERT-Bund Security Advisories publishes new changes.

Free. Unsubscribe anytime.