diff --git a/advisories/github-reviewed/2025/12/GHSA-5j59-xgg2-r9c4/GHSA-5j59-xgg2-r9c4.json b/advisories/github-reviewed/2025/12/GHSA-5j59-xgg2-r9c4/GHSA-5j59-xgg2-r9c4.json index 7f48089c5befc..8f33ef17b83aa 100644 --- a/advisories/github-reviewed/2025/12/GHSA-5j59-xgg2-r9c4/GHSA-5j59-xgg2-r9c4.json +++ b/advisories/github-reviewed/2025/12/GHSA-5j59-xgg2-r9c4/GHSA-5j59-xgg2-r9c4.json @@ -3,7 +3,7 @@ "id": "GHSA-5j59-xgg2-r9c4", "modified": "2025-12-12T17:21:58Z", "published": "2025-12-12T17:21:57Z", - "aliases": [], + "aliases": ["CVE-2025-67779"], "summary": "Next has a Denial of Service with Server Components - Incomplete Fix Follow-Up", "details": "It was found that the fix addressing [CVE-2025-55184](https://github.com/advisories/GHSA-2m3v-v2m8-q956) in React Server Components was incomplete and did not fully prevent denial-of-service attacks in all payload types. This affects React package versions 19.0.2, 19.1.3, and 19.2.2 and frameworks that use the affected packages, including Next.js 13.x, 14.x, 15.x and 16.x using the App Router. The issue is tracked upstream as [CVE-2025-67779](https://www.cve.org/CVERecord?id=CVE-2025-67779).\n\nA malicious HTTP request can be crafted and sent to any Server Function endpoint that, when deserialized, can enter an infinite loop within the React Server Components runtime. This can cause the server process to hang and consume CPU, resulting in denial of service in unpatched environments.", "severity": [ @@ -245,4 +245,4 @@ "github_reviewed_at": "2025-12-12T17:21:57Z", "nvd_published_at": "2025-12-12T00:15:46Z" } -} \ No newline at end of file +}