Next.js Server Actions Vulnerability: Denial of Service (DoS)

Published Date: January 5, 2025

Package Affected Versions Patched Versions Severity
📦 next (npm) >= 13.0.0, < 13.5.8 13.5.8 Moderate

Description

Affected Versions:



  • >= 13.0.0, < 13.5.8

  • >= 14.0.0, < 14.2.21

  • >= 15.0.0, < 15.1.2


Patched Versions:

  • 13.5.8

  • 14.2.21

  • 15.1.2






Description


Attackers can exploit this vulnerability by sending crafted requests to Server Actions. These requests hang indefinitely until the hosting provider cancels them.

While the Next.js server doesn’t consume significant CPU or memory during this time, the connection remains open, preventing it from handling new requests.

Deployments without protections against long-running Server Action invocations are at higher risk. Hosting providers like Vercel or Netlify typically enforce time limits on function execution to avoid excessive billing.

This issue resembles attacks using invalid Content-Length headers or connections that never close. If the hosting environment lacks protections against such scenarios, this vulnerability becomes more significant.

Key Note: Only deployments using Server Actions are affected.

Patches & Workarounds

Recommended Fix


Update Next.js to one of the patched versions:

  • 13.5.8

  • 14.2.21

  • 15.1.2


Run:

npm install next@latest


Or specify the exact version:

npm install next@14.2.21


Additionally:

  • Set reasonable timeout limits on your hosting provider.

  • Monitor long-running requests and enforce cancellation rules.

References

https://nvd.nist.gov/vuln/detail/CVE-2024-56332
Share this:
  • Top 10 Viruses and Malware Wreaking Havoc in January 2025

    Learn how to identify and defend against the latest cybersecurity threats like Banshee, Clop Ransomware, and AI-powered attacks. Stay one step ahead of hackers with this detailed guide.

  • Should You Invest in DIY AI Assistants?

    With AI technologies advancing rapidly, there’s growing interest in building personal assistants at home. Today, big names like Alexa and Google Home dominate the market, but their capabilities remain limited by their current integrations. Meanwhile, ChatGPT and Google’s Gemini have revolutionized conversational AI, although they lack standalone devices or wake-word functionality. These limitations won’t last…

  • How Spilled Coffee Saved a Company

    Small businesses face countless threats—phishing attacks, ransomware, budget constraints, and, occasionally, over-caffeinated interns. This is the story of Taxify Associates, a mid-sized accounting firm that narrowly avoided financial ruin thanks to a spilled cup of coffee, a frayed carpet, and one overworked IT manager.

  • How Cybercriminals Bypass Apple iMessage Security Protections

    Cybercriminals have found a simple yet effective way to bypass Apple’s phishing protections built into iMessage. This exploit enables them to trick users into activating dangerous phishing links. As mobile devices dominate how people pay bills, shop, and communicate, phishing attacks (a form of fraudulent message-based scamming) are becoming more popular among bad actors.

  • Windows Security vs Norton Small Business: Best Antivirus for SMBs in 2025 Compared

    When it comes to protecting your small or medium-sized business (SMB), antivirus software is a must. In 2025, two popular choices for SMBs are Windows Security and Norton Small Business. Both aim to shield your business from threats like malware, phishing, and ransomware, but they take very different approaches.

  • Build a Local AI Search Engine with Ollama

    In today’s world, companies generate mountains of documents daily. Finding a single file among shared network drives, cloud storage, and local folders can feel like searching for a needle in a haystack. Fortunately, with tools like Ollama—a local AI model—you can build a powerful, privacy-friendly search engine tailored for your company’s needs.