CVE-2026-3125

MEDIUM
中文标题:
(暂无数据)
英文标题:
A Server-Side Request Forgery (SSRF) vulnerability was identified in the @opennextjs/cloudflare pack
CVSS分数: 6.5
发布时间: 2026-03-04 19:16:19
漏洞类型: (暂无数据)
状态: PUBLISHED
数据质量分数: 0.40
数据版本: v2
漏洞描述
中文描述:

(暂无数据)

英文描述:

A Server-Side Request Forgery (SSRF) vulnerability was identified in the @opennextjs/cloudflare package, resulting from a path normalization bypass in the /cdn-cgi/image/ handler.The @opennextjs/cloudflare worker template includes a /cdn-cgi/image/ handler intended for development use only. In production, Cloudflare's edge intercepts /cdn-cgi/image/ requests before they reach the Worker. However, by substituting a backslash for a forward slash (/cdn-cgi\image/ instead of /cdn-cgi/image/), an attacker can bypass edge interception and have the request reach the Worker directly. The JavaScript URL class then normalizes the backslash to a forward slash, causing the request to match the handler and trigger an unvalidated fetch of arbitrary remote URLs. For example: https://victim-site.com/cdn-cgi\image/aaaa/https://attacker.com In this example, attacker-controlled content from attacker.com is served through the victim site's domain (victim-site.com), violating the same-origin policy and potentially misleading users or other services. Note: This bypass only works via HTTP clients that preserve backslashes in paths (e.g., curl --path-as-is). Browsers normalize backslashes to forward slashes before sending requests. Additionally, Cloudflare Workers with Assets and Cloudflare Pages suffer from a similar vulnerability. Assets stored under /cdn-cgi/ paths are not publicly accessible under normal conditions. However, using the same backslash bypass (/cdn-cgi\... instead of /cdn-cgi/...), these assets become publicly accessible. This could be used to retrieve private data. For example, Open Next projects store incremental cache data under /cdn-cgi/_next_cache, which could be exposed via this bypass.

CWE类型:
CWE-918 CWE-706
标签:
(暂无数据)
受影响产品
厂商 产品 版本 版本范围 平台 CPE
opennextjs opennext_for_cloudflare * - - cpe:2.3:a:opennextjs:opennext_for_cloudflare:*:*:*:*:*:node.js:*:*
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
参考链接
cna@cloudflare.com OTHER
nvd.nist.gov
访问
cna@cloudflare.com OTHER
nvd.nist.gov
访问
cna@cloudflare.com OTHER
nvd.nist.gov
访问
cna@cloudflare.com OTHER
nvd.nist.gov
访问
CVSS评分详情
6.5
MEDIUM
CVSS向量: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
CVSS版本: 3.1
机密性
LOW
完整性
LOW
可用性
NONE
时间信息
发布时间:
2026-03-04 19:16:19
修改时间:
2026-03-04 19:16:19
创建时间:
2026-03-05 06:00:02
更新时间:
2026-03-10 06:00:03
利用信息
暂无可利用代码信息
数据源详情
数据源 记录ID 版本 提取时间
NVD nvd_CVE-2026-3125 2026-03-05 02:00:04 2026-03-04 22:00:02
版本与语言
当前版本: v2
主要语言: EN
支持语言:
EN
安全公告
暂无安全公告信息
变更历史
v2 NVD
2026-03-10 06:00:03
severity: SeverityLevel.UNKNOWN → SeverityLevel.MEDIUM; cvss_score: 未提取 → 6.5; cvss_vector: 未提取 → CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N; cvss_version: 未提取 → 3.1; affected_products_count: 0 → 1
查看详细变更
  • severity: SeverityLevel.UNKNOWN -> SeverityLevel.MEDIUM
  • cvss_score: 未提取 -> 6.5
  • cvss_vector: 未提取 -> CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
  • cvss_version: 未提取 -> 3.1
  • affected_products_count: 0 -> 1