Next.js has a Middleware / Proxy bypass through dynamic route parameter injection
Package
Affected versions
>= 15.4.0, < 15.5.16
>= 16.0.0, < 16.2.5
Patched versions
15.5.16
16.2.5
Description
Published to the GitHub Advisory Database
May 11, 2026
Reviewed
May 11, 2026
Published by the National Vulnerability Database
May 13, 2026
Last updated
May 14, 2026
Impact
Applications that rely on middleware to protect dynamic routes can be vulnerable to authorization bypass. In affected deployments, specially crafted query parameters can alter the dynamic route value seen by the page while leaving the visible path unchanged, which can allow protected content to be rendered without passing the expected middleware check.
Fix
We now only honor internal route-parameter normalization in trusted routing flows and ignore externally supplied parameter encodings that should never have been accepted from ordinary requests.
Workarounds
If you cannot upgrade immediately, enforce authorization in route or page logic instead of relying solely on middleware path matching.
References