Confirm CVE-2026-44578 exposure on a Next.js app in scope for a bug bounty program.
Run a mass scan of authorized targets from a file and save findings to JSON.
Demonstrate SSRF impact by retrieving cloud metadata credentials during a red team exercise.
Teach a class on SSRF using a known vulnerable Next.js build.
Only legal against systems you are authorized to test; requires Python 3.10+.
NextPulse is a Python command line tool used by security researchers and bug bounty hunters to probe websites built with Next.js, a popular web framework. It targets a specific published vulnerability, tracked as CVE-2026-44578, in how certain versions of Next.js handle WebSocket upgrade requests. The README lists the exact version ranges that are affected, between Next.js 13.4.13 and 15.5.15 and between 16.0.0 and 16.2.4, and the fixed releases that close the issue. The vulnerability is a class of bug called Server Side Request Forgery, or SSRF, which tricks the website's own server into making outbound requests on the attacker's behalf. The most damaging use of this is reaching internal cloud metadata endpoints, special addresses inside Amazon Web Services, Azure, Google Cloud, and similar platforms that hand out temporary credentials to anything that asks from the right network position. NextPulse automates each step: it fingerprints the target, confirms whether the bug is present, sends the malformed upgrade request, and pulls back credentials from the cloud provider. The tool can be driven in a single scan, in an interactive shell with commands like aws, azure, and url, or as a mass scanner reading a list of targets from a file or a pipe. Output can be saved to JSON for later review. The author explicitly limits the intended use to authorized testing, bug bounty programs, red team work, and education, and includes a section of defensive guidance for the operators of vulnerable sites. The project requires Python 3.10 or newer and is released under the MIT license.
Generated 2026-05-22 · Model: sonnet-4-6 · Verify against the repo before relying on details.