9.3 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N
7.1 High
AI Score
Confidence
High
0.001 Low
EPSS
Percentile
20.6%
Next.js is vulnerable to Server Side Request Forgery. The vulnerability is due to an absence of input sanitization in the Next.js SDK tunnel endpoint. This issue can be exploited by an attacker to send malicious HTTP requests to arbitrary URLs, thus resulting in server side request forgery.
CPE | Name | Operator | Version |
---|---|---|---|
@sentry/nextjs | le | 7.76.0 | |
@sentry/nextjs | le | 7.76.0 |
9.3 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N
7.1 High
AI Score
Confidence
High
0.001 Low
EPSS
Percentile
20.6%