Next.js Middleware Flaw Lets Attackers Bypass Authorization
Researchers have uncovered a critical vulnerability (CVE-2025-29927) in Next.js middleware, allowing authorization bypass. Learn about the exploit and fixes.
More results...
Researchers have uncovered a critical vulnerability (CVE-2025-29927) in Next.js middleware, allowing authorization bypass. Learn about the exploit and fixes.
This isn’t new, but it’s increasingly popular:
The technique is known as device code phishing. It exploits “device code flow,” a form of authentication formalized in the industry-wide OAuth standard. Authentication through device code flow is designed for logging printers, smart TVs, and similar devices into accounts. These devices typically don’t support browsers, making it difficult to sign in using more standard forms of authentication, such as entering user names, passwords, and two-factor mechanisms.
Rather than authenticating the user directly, the input-constrained device displays an alphabetic or alphanumeric device code along with a link associated with the user account. The user opens the link on a computer or other device that’s easier to sign in with and enters the code. The remote server then sends a token to the input-constrained device that logs it into the account…
Tel Aviv startup raises $8 million in Series A funding to help developers add secure access approval flows to applications.
The post Permit.io Raises $8 Million for Authorization Platform appeared first on SecurityWeek.
Authorization layer solution provider Cerbos has raised $7.5 million in an extended seed round led by Omers Ventures.
The post Cerbos Raises $7.5 Million for Authorization Platform appeared first on SecurityWeek.