Tuesday , September 23 2025
Next.js

Next.js and HashiCorp Vuln Found: Patch Now!

A critical security flaw in the Next.js framework, marked as CVE-2025-29927, lets attackers bypass authorization, threatening web applications. This vulnerability stems from the mishandling of the x-middleware-subrequest header in Next.js middleware, which could allow unauthorized access to sensitive admin areas and protected resources.

The vulnerability affects various versions of the React web framework, with different exploitation methods for each version. NullSecurityX reports that the core of this vulnerability lies in Next.js’s middleware processing logic, specifically how it handles the x-middleware-subrequest header.

Microsoft to Build the “World’s Most Powerful AI Data Center”

Microsoft has announced a new $4 billion investment in Wisconsin for a second hyperscale AI data center. This adds to...
Read More
Microsoft to Build the “World’s Most Powerful AI Data Center”

Fraudsters swipe Tk 27 lakh from SCB cardholders

An organised racket has reportedly siphoned off lakhs from Standard Chartered Bangladesh's (SCB) credit card holders, raising serious cybersecurity concerns....
Read More
Fraudsters swipe Tk 27 lakh from SCB cardholders

EDR-Freeze: A Tool That Puts EDRs And Antivirus Into A Coma State

A new proof-of-concept tool named EDR-Freeze has been developed, capable of placing Endpoint Detection and Response (EDR) and antivirus solutions...
Read More
EDR-Freeze: A Tool That Puts EDRs And Antivirus Into A Coma State

First-ever AI-powered ‘MalTerminal’ Malware Uses OpenAI GPT-4 to Generate Code

AI-driven malware called 'MalTerminal' utilizes OpenAI's GPT-4 to create harmful code like ransomware and reverse shells, indicating a major change...
Read More
First-ever AI-powered ‘MalTerminal’ Malware Uses OpenAI GPT-4 to Generate Code

Gmail Data exposes via ChatGPT Deep Research Agent dubbed “ShadowLeak Zero-Click” Flaw

Cybersecurity researchers revealed a zero-click vulnerability in OpenAI ChatGPT's Deep Research agent that lets attackers leak sensitive Gmail inbox data...
Read More
Gmail Data exposes via ChatGPT Deep Research Agent dubbed “ShadowLeak Zero-Click” Flaw

Cyber attack disrupts several European airports: check-in and boarding systems affected

Several European airports are experiencing flight delays and cancellations due to a cyber attack on a check-in and boarding systems...
Read More
Cyber attack disrupts several European airports: check-in and boarding systems affected

Hacker claim to breach Link3; 189,000 Users data up for sale

A threat actor claims to have breached Link3, a major IT solutions and internet service provider based in Bangladesh. The...
Read More
Hacker claim to breach Link3; 189,000 Users data up for sale

Check Point Hosts “Securing the Hyperconnected World in the AI Era” in Dhaka

Check point, a cyber security solutions provider hosts an event titled "securing the hyperconnected world in the AI era" at...
Read More
Check Point Hosts “Securing the Hyperconnected World in the AI Era” in Dhaka

Microsoft Confirms 900+ XSS Vulns Found in IT Services

Cross-Site Scripting (XSS) is one of the oldest and most persistent vulnerabilities in modern applications. Despite being recognized for over...
Read More
Microsoft Confirms 900+ XSS Vulns Found in IT Services

Daily Security Update Dated : 15.09.2025

Every day a lot of cyberattack happen around the world including ransomware, Malware attack, data breaches, website defacement and so...
Read More
Daily Security Update Dated : 15.09.2025

This header was meant to stop infinite middleware loops by recognizing internal subrequests, but poor implementation lets external requests exploit it. This vulnerability is especially harmful when used with JSON Web Token (JWT) or cookie authentication, as header manipulation can bypass token validation completely.

Security researchers have created simple scripts that test common admin paths (/admin, /dashboard, /settings) with the malicious header to find vulnerabilities in applications.

The vulnerability goes beyond just bypassing authorization. In apps that depend only on Next.js middleware for security, attackers could access sensitive user data, change app settings, or perform admin tasks without proper authentication.

Organizations using Next.js should quickly review their middleware and apply any security patches.

This discovery emphasizes the importance of defense-in-depth security strategies, utilizing authorization controls at various application layers instead of just relying on middleware protections.

HashiCorp has released a security advisory for a new vulnerability in Vault, its popular secrets management platform. Known as CVE-2025-6203 and rated CVSS 7.5 (High), this flaw could enable a malicious user to cause a Denial-of-Service (DoS) by sending specially crafted JSON payloads.

The issue stems from Vault’s handling of complex JSON requests. According to the advisory, “A malicious user may submit a specially-crafted complex payload that otherwise meets the default request size limit which results in excessive memory and CPU consumption of Vault. This may lead to a timeout in Vault’s auditing subroutine, potentially resulting in the Vault server to become unresponsive.”

ChatGPT Leaks: 1,000 Public AI Conversations Analyzed: What research find

Check Also

Palo Alto Networks User-ID Credential Agent Vuln Exposes password In Cleartext

A new vulnerability, CVE-2025-4235, in Palo Alto Networks’ User-ID Credential Agent for Windows, could reveal …