Bug 2448514 (CVE-2026-27977) - CVE-2026-27977 next.js: Next.js: null origin can bypass dev HMR websocket CSRF checks
Summary: CVE-2026-27977 next.js: Next.js: null origin can bypass dev HMR websocket CSR...
Keywords:
Status: NEW
Alias: CVE-2026-27977
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On: 2448734 2448737 2448728 2448730
Blocks:
TreeView+ depends on / blocked
 
Reported: 2026-03-18 01:02 UTC by OSIDB Bzimport
Modified: 2026-03-18 18:45 UTC (History)
14 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2026-03-18 01:02:19 UTC
Next.js is a React framework for building full-stack web applications. Starting in version 16.0.1 and prior to version 16.1.7, in `next dev`, cross-site protection for internal websocket endpoints could treat `Origin: null` as a bypass case even if `allowedDevOrigins` is configured, allowing privacy-sensitive/opaque contexts (for example sandboxed documents) to connect unexpectedly. If a dev server is reachable from attacker-controlled content, an attacker may be able to connect to the HMR websocket channel and interact with dev websocket traffic. This affects development mode only. Apps without a configured `allowedDevOrigins` still allow connections from any origin. The issue is fixed in version 16.1.7 by validating `Origin: null` through the same cross-site origin-allowance checks used for other origins. If upgrading is not immediately possible, do not expose `next dev` to untrusted networks and/or block websocket upgrades to `/_next/webpack-hmr` when `Origin` is `null` at the proxy.


Note You need to log in before you can comment on or make changes to this bug.