CVE-2026-40299
next-intl has an open redirect vulnerability
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th
next-intl provides internationalization for Next.js. Applications using the `next-intl` middleware prior to version 4.9.1with `localePrefix: 'as-needed'` could construct URLs where path handling and the WHATWG URL parser resolved a relative redirect target to another host (e.g. scheme-relative `//` or control characters stripped by the URL parser), so the middleware could redirect the browser off-site while the user still started from a trusted app URL. The problem has been patchedin `[email protected]`.
| CWE | CWE-601 |
| Vendor | amannn |
| Product | next-intl |
| Published | Apr 17, 2026 |
Stay Ahead of the Next One
Get instant alerts for amannn next-intl
Be the first to know when new unknown vulnerabilities affecting amannn next-intl are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
amannn / next-intl
< 4.9.1
References
github.com: https://github.com/amannn/next-intl/security/advisories/GHSA-8f24-v5vv-gm5j github.com: https://github.com/amannn/next-intl/pull/2304 github.com: https://github.com/amannn/next-intl/commit/1c80b668aa6d853f470319eec10a3f61e78a70e6 github.com: https://github.com/amannn/next-intl/releases/tag/v4.9.1