{"id":"CVE-2021-43803","details":"Next.js is a React framework. In versions of Next.js prior to 12.0.5 or 11.1.3, invalid or malformed URLs could lead to a server crash. In order to be affected by this issue, the deployment must use Next.js versions above 11.1.0 and below 12.0.5, Node.js above 15.0.0, and next start or a custom server. Deployments on Vercel are not affected, along with similar environments where invalid requests are filtered before reaching Next.js. Versions 12.0.5 and 11.1.3 contain patches for this issue.","aliases":["GHSA-25mp-g6fv-mqxx"],"modified":"2026-04-12T03:54:29.495322Z","published":"2021-12-10T00:15:11.827Z","related":["GHSA-25mp-g6fv-mqxx"],"references":[{"type":"ADVISORY","url":"https://github.com/vercel/next.js/releases/tag/v11.1.3"},{"type":"ADVISORY","url":"https://github.com/vercel/next.js/releases/v12.0.5"},{"type":"FIX","url":"https://github.com/vercel/next.js/commit/6d98b4fb4315dec1badecf0e9bdc212a4272b264"},{"type":"FIX","url":"https://github.com/vercel/next.js/pull/32080"},{"type":"FIX","url":"https://github.com/vercel/next.js/security/advisories/GHSA-25mp-g6fv-mqxx"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/vercel/next.js","events":[{"introduced":"ce4adfc02d3532e2c62ed8088660df1655e66278"},{"fixed":"ec1a0f7643172e5beba96e7be7d000471813cf69"},{"introduced":"8a450db14a1b29d506ec86df1a002bc525ab0da7"},{"fixed":"b6162bb6b6b46788ef2ae700d81c99e94d903900"},{"fixed":"6d98b4fb4315dec1badecf0e9bdc212a4272b264"}],"database_specific":{"cpe":"cpe:2.3:a:vercel:next.js:*:*:*:*:*:node.js:*:*","extracted_events":[{"introduced":"11.1.0"},{"fixed":"11.1.3"},{"introduced":"12.0.0"},{"fixed":"12.0.5"}],"source":["CPE_FIELD","REFERENCES"]}}],"versions":["v11.1.0","v11.1.1","v11.1.1-canary.0","v11.1.1-canary.1","v11.1.1-canary.10","v11.1.1-canary.11","v11.1.1-canary.12","v11.1.1-canary.13","v11.1.1-canary.14","v11.1.1-canary.15","v11.1.1-canary.16","v11.1.1-canary.17","v11.1.1-canary.18","v11.1.1-canary.19","v11.1.1-canary.2","v11.1.1-canary.3","v11.1.1-canary.4","v11.1.1-canary.5","v11.1.1-canary.6","v11.1.1-canary.7","v11.1.1-canary.8","v11.1.1-canary.9","v11.1.2","v11.1.2-canary.0","v12.0.0","v12.0.1","v12.0.1-canary.0","v12.0.1-canary.1","v12.0.1-canary.2","v12.0.1-canary.3","v12.0.1-canary.4","v12.0.1-canary.5","v12.0.2","v12.0.2-canary.0","v12.0.2-canary.1","v12.0.2-canary.10","v12.0.2-canary.11","v12.0.2-canary.12","v12.0.2-canary.13","v12.0.2-canary.14","v12.0.2-canary.2","v12.0.2-canary.3","v12.0.2-canary.4","v12.0.2-canary.5","v12.0.2-canary.6","v12.0.2-canary.7","v12.0.2-canary.8","v12.0.2-canary.9","v12.0.3","v12.0.3-canary.0","v12.0.3-canary.1","v12.0.3-canary.10","v12.0.3-canary.2","v12.0.3-canary.3","v12.0.3-canary.4","v12.0.3-canary.5","v12.0.3-canary.6","v12.0.3-canary.7","v12.0.3-canary.8","v12.0.3-canary.9","v12.0.4","v12.0.4-canary.0","v12.0.4-canary.1","v12.0.4-canary.10","v12.0.4-canary.11","v12.0.4-canary.12","v12.0.4-canary.13","v12.0.4-canary.14","v12.0.4-canary.15","v12.0.4-canary.2","v12.0.4-canary.3","v12.0.4-canary.4","v12.0.4-canary.5","v12.0.4-canary.6","v12.0.4-canary.8","v12.0.4-canary.9","v12.0.5-canary.0","v12.0.5-canary.1","v12.0.5-canary.10","v12.0.5-canary.11","v12.0.5-canary.12","v12.0.5-canary.13","v12.0.5-canary.14","v12.0.5-canary.16","v12.0.5-canary.18","v12.0.5-canary.19","v12.0.5-canary.2","v12.0.5-canary.3","v12.0.5-canary.4","v12.0.5-canary.5","v12.0.5-canary.6","v12.0.5-canary.7","v12.0.5-canary.8","v12.0.5-canary.9"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2021-43803.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}