nerdculture.de is one of the many independent Mastodon servers you can use to participate in the fediverse.
Be excellent to each other, live humanism, no nazis, no hate speech. Not only for nerds, but the domain is somewhat cool. ;) No bots in general. Languages: DE, EN, FR, NL, ES, IT

Administered by:

Server stats:

1.2K
active users

#nextjs

12 posts12 participants0 posts today

Vielen Dank für Orga, Teilnahme und die rege Diskussion rund um das Thema #NextJS gestern bei der #JugHH!

Hier findet ihr Links zur Beispiel-Anwendungen und zum Live-Coding-Code: react.schule/jughh-nextjs

Bis zum nächsten Mal 😊

PS: Wenn euch das Thema interessiert, und ihr in der Region #Dortmund unterwegs seid: im April halte ich den Vortrag dort auf der User Group von #Codecentric: meetup.com/codecentric-dortmun

Critical Next.js Middleware Vulnerability (CVE-2025-29927)

A major auth bypass vulnerability in Next.js middleware (prior to v14.2.25 / v15.2.3) allows attackers to inject the x-middleware-subrequest header and bypass authorization entirely. Exploitable via simple HTTP requests—no user interaction, no special permissions.

Patch. Now. Or block the header manually.

GitHub scored this 9.1 CRITICAL, but the real issue? This flaw exposes a systemic weakness in middleware validation, and some vendors weren’t exactly upfront about the risks.

Details + POC: zeropath.com/blog/nextjs-middl
NVD: nvd.nist.gov/vuln/detail/CVE-2

Security theater is easy. Secure defaults and transparency are harder—but essential.

zeropath.comNext.js Middleware Exploit: Deep Dive into CVE-2025-29927 Authorization Bypass - ZeroPath BlogExplore the critical CVE-2025-29927 vulnerability in Next.js middleware, enabling attackers to bypass authorization checks and gain unauthorized access.