Exploit for CVE-2025-29927
Discription

image
Here's a clean and informative README.md for your GitHub repo that explains it's a vulnerable Next.js application for CVE-2025-29927 and includes a link to your setup YouTube video: 🔓 NextJS-CVE-2025-29927 – Vulnerable Demo Application This is a vulnerable Next.js application that demonstrates CVE-2025-29927, a security flaw identified in web applications using Next.js with improper input handling or access control flaws. The project uses a MySQL backend and JWT Authenticaion and is designed for educational and testing purposes only — such as for penetration testing labs, responsible disclosure demos, and security research. The passwords for the test accounts on users.csv is "123456" and secret key for JWT Authenticaion "JWT_SECRET" is added to the file ".env.local" and has been shared on this public repo on purpose and is not JWT token been used in production. This is simplify the deployment and testing. You can also replace the secret key for the JWT with the one you generated but the .env file should exist for the JWT authenticaion to work. ⚠️ Disclaimer: This project is intentionally vulnerable. Do NOT deploy this in production environments. Use only in isolated or controlled setups for educational use. 📹 YouTube links on how to setup this project and 2nd is Demo on how it is exploited Watch the full setup and demo guide on YouTube here how to setup this project: ▶️ [How to Setup & Run the CVE-2025-29927 Demo] Watch the full demo on YouTube here how the…Read More

Back to Main

Subscribe for the latest news: