Skip to content

chore(deps): update dependency @opennextjs/cloudflare to v1.17.1 [security]#642

Open
renovate[bot] wants to merge 1 commit intomainfrom
renovate/npm-opennextjs-cloudflare-vulnerability
Open

chore(deps): update dependency @opennextjs/cloudflare to v1.17.1 [security]#642
renovate[bot] wants to merge 1 commit intomainfrom
renovate/npm-opennextjs-cloudflare-vulnerability

Conversation

@renovate
Copy link
Copy Markdown

@renovate renovate bot commented Mar 5, 2026

This PR contains the following updates:

Package Change Age Confidence
@opennextjs/cloudflare (source) 1.14.101.17.1 age confidence

GitHub Vulnerability Alerts

CVE-2026-3125

A Server-Side Request Forgery (SSRF) vulnerability was identified in the @​opennextjs/cloudflare package, resulting from a path normalization bypass in the /cdn-cgi/image/ handler.

The @​opennextjs/cloudflare worker template includes a /cdn-cgi/image/ handler intended for development use only. In production, Cloudflare's edge intercepts /cdn-cgi/image/ requests before they reach the Worker. However, by substituting a backslash for a forward slash (/cdn-cgi\image/ instead of /cdn-cgi/image/), an attacker can bypass edge interception and have the request reach the Worker directly. The JavaScript URL class then normalizes the backslash to a forward slash, causing the request to match the handler and trigger an unvalidated fetch of arbitrary remote URLs.

For example: https://victim-site.com/cdn-cgi\image/aaaa/https://attacker.com

In this example, attacker-controlled content from attacker.com is served through the victim site's domain (victim-site.com), violating the same-origin policy and potentially misleading users or other services.

Note: This bypass only works via HTTP clients that preserve backslashes in paths (e.g., curl --path-as-is). Browsers normalize backslashes to forward slashes before sending requests.

Additionally, Cloudflare Workers with Assets and Cloudflare Pages suffer from a similar vulnerability. Assets stored under /cdn-cgi/ paths are not publicly accessible under normal conditions. However, using the same backslash bypass (/cdn-cgi... instead of /cdn-cgi/...), these assets become publicly accessible. This could be used to retrieve private data. For example, Open Next projects store incremental cache data under /cdn-cgi/_next_cache, which could be exposed via this bypass.

Impact

  • SSRF via path normalization bypass of Cloudflare edge interception
  • Arbitrary remote content loading under the victim site's domain
  • Same-origin policy bypass
  • Potential for infrastructure abuse (scanning from Cloudflare IP space, worker resource exhaustion)
  • Exposure of private assets stored under /cdn-cgi/ paths. For example, Open Next projects store incremental cache data under /cdn-cgi/_next_cache, which could be exposed via this bypass.

Credits

Disclosed responsibly by security researcher @​Ezzer17.

Mitigations

The following mitigations have been put in place:

Server-side updates to Cloudflare's Workers platform to block backslash path normalization bypasses for /cdn-cgi requests. The update automatically mitigates the issue for all existing and any future sites deployed to Cloudflare Workers.

In addition to the platform level fix, Root cause fix has been implemented to the Cloudflare adapter for Open Next. The patched version of the adapter is found at @​opennextjs/cloudflare@1.17.1 (https://www.npmjs.com/package/@​opennextjs/cloudflare)

Dependency update to the Next.js template used with create-cloudflare (c3) to use the fixed version of the Cloudflare adapter for Open Next. Despite the automatic mitigation deployed on Cloudflare's platform, we encourage affected users to upgrade to the patched version of @​opennextjs/cloudflare.


Release Notes

opennextjs/opennextjs-cloudflare (@​opennextjs/cloudflare)

v1.17.1

Compare Source

Patch Changes

v1.17.0

Compare Source

Minor Changes
  • #​1133 25d5835 Thanks @​dario-piotrowicz! - Update the migrate command to attempt to create an R2 bucket for caching, if that is not possible an application without caching enabled will be generated instead.

v1.16.6

Compare Source

Patch Changes
  • #​1138 4487f1f Thanks @​james-elicx! - Fix the CLI potentially setting a future compatibility date in the wrangler config when workerd has published a version matching a future date, by capping to the current date.

v1.16.5

Compare Source

Patch Changes

v1.16.4

Compare Source

Patch Changes

v1.16.3

Compare Source

Patch Changes

v1.16.2

Compare Source

Patch Changes

v1.16.1

Compare Source

Patch Changes

v1.16.0

Compare Source

Minor Changes
  • #​1083 b062597 Thanks @​dario-piotrowicz! - feature: add migrate command to set up OpenNext for Cloudflare adapter

    This command helps users migrate existing Next.js applications to the OpenNext Cloudflare adapter by automatically setting up all necessary configuration files, dependencies, and scripts.

    To use the command simply run: npx opennextjs-cloudflare migrate

Patch Changes
  • #​1092 4279043 Thanks @​vicb! - Check for supported Next version

    The build will now error for unsupported Next version which may contain unpatched security vulnerabilities.
    You can bypass the check using the --dangerouslyUseUnsupportedNextVersion flag.

v1.15.1

Compare Source

Patch Changes

v1.15.0

Compare Source

Minor Changes
Patch Changes

Configuration

📅 Schedule: Branch creation - "" in timezone Asia/Tokyo, Automerge - At any time (no schedule defined).

🚦 Automerge: Enabled.

Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

@renovate renovate bot enabled auto-merge (squash) March 5, 2026 04:05
@github-actions
Copy link
Copy Markdown

github-actions bot commented Mar 5, 2026

Version Preview URL: https://5e38a4d3-dreamvision.nemolize.workers.dev

@renovate renovate bot force-pushed the renovate/npm-opennextjs-cloudflare-vulnerability branch from 0a1b09e to 36ab435 Compare March 5, 2026 18:12
@renovate renovate bot force-pushed the renovate/npm-opennextjs-cloudflare-vulnerability branch from 36ab435 to 1b6b869 Compare March 13, 2026 10:39
@renovate renovate bot changed the title chore(deps): update dependency @opennextjs/cloudflare to v1.17.1 [security] chore(deps): update dependency @opennextjs/cloudflare to v1.17.1 [security] - autoclosed Mar 27, 2026
@renovate renovate bot closed this Mar 27, 2026
auto-merge was automatically disabled March 27, 2026 02:11

Pull request was closed

@renovate renovate bot deleted the renovate/npm-opennextjs-cloudflare-vulnerability branch March 27, 2026 02:11
@renovate renovate bot changed the title chore(deps): update dependency @opennextjs/cloudflare to v1.17.1 [security] - autoclosed chore(deps): update dependency @opennextjs/cloudflare to v1.17.1 [security] Mar 30, 2026
@renovate renovate bot reopened this Mar 30, 2026
@renovate renovate bot force-pushed the renovate/npm-opennextjs-cloudflare-vulnerability branch 2 times, most recently from 1b6b869 to 31b61ad Compare March 30, 2026 21:14
@renovate renovate bot force-pushed the renovate/npm-opennextjs-cloudflare-vulnerability branch from 31b61ad to 3011e7b Compare April 1, 2026 17:41
@renovate renovate bot enabled auto-merge (squash) April 1, 2026 17:41
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

0 participants