Mend.io Vulnerability Database
The largest open source vulnerability database
What is a Vulnerability ID?
New vulnerability? Tell us about it!
CVE-2026-44577
Published:May 11, 2026
Updated:May 12, 2026
Impact When self-hosting Next.js with the default image loader, the Image Optimization API fetches local images entirely into memory without enforcing a maximum size limit. An attacker could cause out-of-memory conditions by requesting large local assets from the "/_next/image" endpoint that match the "images.localPatterns" configuration (by default, all patterns are allowed). - If you are using "images.localPatterns", only the patterns in that array are impacted. - If you are using "images.unoptimized: true", you are NOT impacted. - If you are using "images.loader: 'custom'", you are NOT impacted. - If you are using Vercel, you are NOT impacted. Fix We now apply response size limits consistently to internal image fetches, not just external ones, and fail oversized responses before they can exhaust process memory. This can be adjusted using the "images.maximumResponseBody" configuration. Workarounds If you cannot upgrade immediately, avoid routing large local assets through "/_next/image", disable image optimization for large or untrusted local files, or block image optimization access to those assets at the edge. You can disable using the "images.localPatterns: []" configuration. This will still allow fetching remote images (which is not impacted).
Affected Packages
next (NPM):
Affected version(s) >=10.0.0 <15.5.16
Fix Suggestion:
Update to version 15.5.16
next (NPM):
Affected version(s) >=16.0.0 <16.2.5
Fix Suggestion:
Update to version 16.2.5
Do you need more information?
Contact Us
CVSS v4
Base Score:
8.2
Attack Vector
NETWORK
Attack Complexity
HIGH
Attack Requirements
NONE
Privileges Required
NONE
User Interaction
NONE
Vulnerable System Confidentiality
NONE
Vulnerable System Integrity
NONE
Vulnerable System Availability
HIGH
Subsequent System Confidentiality
NONE
Subsequent System Integrity
NONE
Subsequent System Availability
NONE
CVSS v3
Base Score:
5.9
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
NONE
Integrity
NONE
Availability
HIGH
Weakness Type (CWE)
Allocation of Resources Without Limits or Throttling