next-intl has an open redirect vulnerability
Description
Published to the GitHub Advisory Database
Apr 10, 2026
Reviewed
Apr 10, 2026
Published by the National Vulnerability Database
Apr 17, 2026
Last updated
Apr 24, 2026
Impact
Applications using the
next-intlmiddleware withlocalePrefix: 'as-needed'could construct URLs where path handling and the WHATWG URL parser resolved a relative redirect target to another host (e.g. scheme-relative//or control characters stripped by the URL parser), so the middleware could redirect the browser off-site while the user still started from a trusted app URL.Patches
The problem has been patched, please update to
next-intl@4.9.1.Credits
Many thanks to Joni Liljeblad from Oura for responsibly disclosing the vulnerability and for suggesting the fix.
References