Bug 2376220 (CVE-2025-49826)

Summary: CVE-2025-49826 nextjs: Next.js denial of service
Product: [Other] Security Response Reporter: OSIDB Bzimport <bzimport>
Component: vulnerabilityAssignee: Product Security DevOps Team <prodsec-dev>
Status: NEW --- QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: bbrownin, caswilli, chfoley, gotiwari, jhorak, jscholz, kaycoth, lball, mvyas, ngough, swoodman, tpopela, veshanka
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: ---
Doc Text:
A denial of service flaw was found in Next.js. In certain situations, this issue may lead to an HTTP 204 response being cached for static pages, which can result in the 204 response being provided to all users trying to access the page.
Story Points: ---
Clone Of: Environment:
Last Closed: Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2376259, 2376261, 2376264, 2376266, 2376256, 2376258, 2376260, 2376262, 2376263, 2376265    
Bug Blocks:    

Description OSIDB Bzimport 2025-07-03 22:01:11 UTC
Next.js is a React framework for building full-stack web applications. From versions 15.0.4-canary.51 to before 15.1.8, a cache poisoning bug leading to a Denial of Service (DoS) condition was found in Next.js. This issue does not impact customers hosted on Vercel. Under certain conditions, this issue may allow a HTTP 204 response to be cached for static pages, leading to the 204 response being served to all users attempting to access the page. This issue has been addressed in version 15.1.8.