beforemerge-nextjs-review

Warn

Audited by Socket on Mar 15, 2026

1 alert found:

Security
SecurityMEDIUM
rules/security/sec-middleware-bypass.md

This advisory correctly highlights a high-severity design and framework vulnerability: Next.js middleware can be bypassed via an internal header (CVE-2025-29927), so middleware must not be the sole security boundary. Applications that rely only on middleware for auth/authorization are at high risk of complete authentication bypass and destructive unauthorized actions. Recommended mitigations: implement authoritative auth/authorization checks inside every route handler and Server Action, strip internal headers at proxies if self-hosting, and scan codebases for handlers that lack explicit auth checks.

Confidence: 90%Severity: 70%
Audit Metadata
Analyzed At
Mar 15, 2026, 03:20 PM
Package URL
pkg:socket/skills-sh/BeforeMerge%2Fbeforemerge-skills%2Fbeforemerge-nextjs-review%2F@1613e66645b16b8d7129332104de5825505be7eb