๐Ÿ” CVE Alert

CVE-2026-27978

UNKNOWN 0.0

Next.js: null origin can bypass Server Actions CSRF checks

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

Next.js is a React framework for building full-stack web applications. Starting in version 16.0.1 and prior to version 16.1.7, `origin: null` was treated as a "missing" origin during Server Action CSRF validation. As a result, requests from opaque contexts (such as sandboxed iframes) could bypass origin verification instead of being validated as cross-origin requests. An attacker could induce a victim browser to submit Server Actions from a sandboxed context, potentially executing state-changing actions with victim credentials (CSRF). This is fixed in version 16.1.7 by treating `'null'` as an explicit origin value and enforcing host/origin checks unless `'null'` is explicitly allowlisted in `experimental.serverActions.allowedOrigins`. If upgrading is not immediately possible, add CSRF tokens for sensitive Server Actions, prefer `SameSite=Strict` on sensitive auth cookies, and/or do not allow `'null'` in `serverActions.allowedOrigins` unless intentionally required and additionally protected.

CWE CWE-352
Vendor vercel
Product next.js
Published Mar 17, 2026
Last Updated Mar 18, 2026
Stay Ahead of the Next One

Get instant alerts for vercel next.js

Be the first to know when new unknown vulnerabilities affecting vercel next.js are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

vercel / next.js
>= 16.0.1, < 16.1.7

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/vercel/next.js/security/advisories/GHSA-mq59-m269-xvcx github.com: https://github.com/vercel/next.js/commit/a27a11d78e748a8c7ccfd14b7759ad2b9bf097d8 github.com: https://github.com/vercel/next.js/releases/tag/v16.1.7