Between 16:02 UTC and 17:15 UTC on March 22nd 2025, customers who were accessing Supabase services from Next.js middleware had their Supabase requests blocked by our upstream CDN provider.
The impacted requests received a “Sorry, you have been blocked” error response. The primary service impacted was Supabase Auth, as performing auth in Next.js middleware is a common and recommended usage pattern. A smaller number of requests to other Supabase services were also impacted.
We sincerely apologise for the negative effects our customers experienced. Here is some additional detail about what happened and what we will do to mitigate future outages of this nature.
Customers who access Supabase services from Next.js middleware, or otherwise use a x-middleware-subrequest
header were affected. In total, 9.59M requests were blocked across our customers endpoints.
On March 21st 2025, Vercel/Next.js published a security advisory for CVE-2025-29927, which allowed for Authorization Bypass in Next.js Middleware. In addition to advising customers to upgrade to a patched version of Next.js, the security advisory contained a workaround that noted “If patching to a safe version is infeasible, it is recommend that you prevent external user requests which contain the x-middleware-subrequest
header from reaching your Next.js application.”
In an effort to protect their customers from this CVE, our CDN provider implemented a new managed WAF rule to block requests including the x-middleware-subrequest
header, effectively implementing the suggested workaround for the CVE and rolled it out to their customers, which includes Supabase.
The incident timeline was as follows:
Once the WAF rule was disabled, customers were once again able to use the x-middleware-subrequest
header and the incident was resolved.
All customers using Next.js are encouraged to patch to the latest version if you are on a version that is affected by CVE-2025-29927.
If you are hosting your Next.js application with Vercel or Netlify you do not need to take any action as these platforms have built in protection from this CVE, however it is still a good idea to upgrade to a patched version of Next.js.
If you are hosting your Next.js application with a provider that is not Vercel or Netlify, we encourage you to urgently upgrade your application to a safe Next.js version as noted in the Security Advisory.