-
Notifications
You must be signed in to change notification settings - Fork 22
fix(deps): fix react server components cve vulnerabilities #7
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
Updated dependencies to fix Next.js and React CVE vulnerabilities. The fix-react2shell-next tool automatically updated the following packages to their secure versions: - next - react-server-dom-webpack - react-server-dom-parcel - react-server-dom-turbopack All package.json files have been scanned and vulnerable versions have been patched to the correct fixed versions based on the official React advisory. Co-authored-by: Vercel <vercel[bot]@users.noreply.github.com>
|
The latest updates on your projects. Learn more about Vercel for GitHub.
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Pull request overview
This automated security PR updates Next.js from version 15.3.0 to 15.3.8 to address critical remote code execution (RCE) vulnerabilities in React Server Components (CVE-2025-55182 and CVE-2025-66478) that enable unauthenticated RCE via insecure deserialization.
Key Changes:
- Next.js package upgraded from 15.3.0 to 15.3.8
- Associated @next/env package updated to 15.3.8
- Platform-specific SWC compiler packages updated to 15.3.5
Reviewed changes
Copilot reviewed 1 out of 2 changed files in this pull request and generated 2 comments.
| File | Description |
|---|---|
| package.json | Updates Next.js dependency specifier from 15.3.0 to 15.3.8 |
| pnpm-lock.yaml | Updates resolved versions for Next.js core (15.3.8), @next/env (15.3.8), and platform-specific @next/swc packages (15.3.5) along with their integrity hashes |
Files not reviewed (1)
- pnpm-lock.yaml: Language not supported
💡 Add Copilot custom instructions for smarter, more guided reviews. Learn how to get started.
| '@next/swc-darwin-arm64@15.3.5': | ||
| resolution: {integrity: sha512-lM/8tilIsqBq+2nq9kbTW19vfwFve0NR7MxfkuSUbRSgXlMQoJYg+31+++XwKVSXk4uT23G2eF/7BRIKdn8t8w==} | ||
| engines: {node: '>= 10'} | ||
| cpu: [arm64] | ||
| os: [darwin] | ||
|
|
||
| '@next/swc-darwin-x64@15.3.0': | ||
| resolution: {integrity: sha512-m+eO21yg80En8HJ5c49AOQpFDq+nP51nu88ZOMCorvw3g//8g1JSUsEiPSiFpJo1KCTQ+jm9H0hwXK49H/RmXg==} | ||
| '@next/swc-darwin-x64@15.3.5': | ||
| resolution: {integrity: sha512-WhwegPQJ5IfoUNZUVsI9TRAlKpjGVK0tpJTL6KeiC4cux9774NYE9Wu/iCfIkL/5J8rPAkqZpG7n+EfiAfidXA==} | ||
| engines: {node: '>= 10'} | ||
| cpu: [x64] | ||
| os: [darwin] | ||
|
|
||
| '@next/swc-linux-arm64-gnu@15.3.0': | ||
| resolution: {integrity: sha512-H0Kk04ZNzb6Aq/G6e0un4B3HekPnyy6D+eUBYPJv9Abx8KDYgNMWzKt4Qhj57HXV3sTTjsfc1Trc1SxuhQB+Tg==} | ||
| '@next/swc-linux-arm64-gnu@15.3.5': | ||
| resolution: {integrity: sha512-LVD6uMOZ7XePg3KWYdGuzuvVboxujGjbcuP2jsPAN3MnLdLoZUXKRc6ixxfs03RH7qBdEHCZjyLP/jBdCJVRJQ==} | ||
| engines: {node: '>= 10'} | ||
| cpu: [arm64] | ||
| os: [linux] | ||
|
|
||
| '@next/swc-linux-arm64-musl@15.3.0': | ||
| resolution: {integrity: sha512-k8GVkdMrh/+J9uIv/GpnHakzgDQhrprJ/FbGQvwWmstaeFG06nnAoZCJV+wO/bb603iKV1BXt4gHG+s2buJqZA==} | ||
| '@next/swc-linux-arm64-musl@15.3.5': | ||
| resolution: {integrity: sha512-k8aVScYZ++BnS2P69ClK7v4nOu702jcF9AIHKu6llhHEtBSmM2zkPGl9yoqbSU/657IIIb0QHpdxEr0iW9z53A==} | ||
| engines: {node: '>= 10'} | ||
| cpu: [arm64] | ||
| os: [linux] | ||
|
|
||
| '@next/swc-linux-x64-gnu@15.3.0': | ||
| resolution: {integrity: sha512-ZMQ9yzDEts/vkpFLRAqfYO1wSpIJGlQNK9gZ09PgyjBJUmg8F/bb8fw2EXKgEaHbCc4gmqMpDfh+T07qUphp9A==} | ||
| '@next/swc-linux-x64-gnu@15.3.5': | ||
| resolution: {integrity: sha512-2xYU0DI9DGN/bAHzVwADid22ba5d/xrbrQlr2U+/Q5WkFUzeL0TDR963BdrtLS/4bMmKZGptLeg6282H/S2i8A==} | ||
| engines: {node: '>= 10'} | ||
| cpu: [x64] | ||
| os: [linux] | ||
|
|
||
| '@next/swc-linux-x64-musl@15.3.0': | ||
| resolution: {integrity: sha512-RFwq5VKYTw9TMr4T3e5HRP6T4RiAzfDJ6XsxH8j/ZeYq2aLsBqCkFzwMI0FmnSsLaUbOb46Uov0VvN3UciHX5A==} | ||
| '@next/swc-linux-x64-musl@15.3.5': | ||
| resolution: {integrity: sha512-TRYIqAGf1KCbuAB0gjhdn5Ytd8fV+wJSM2Nh2is/xEqR8PZHxfQuaiNhoF50XfY90sNpaRMaGhF6E+qjV1b9Tg==} | ||
| engines: {node: '>= 10'} | ||
| cpu: [x64] | ||
| os: [linux] | ||
|
|
||
| '@next/swc-win32-arm64-msvc@15.3.0': | ||
| resolution: {integrity: sha512-a7kUbqa/k09xPjfCl0RSVAvEjAkYBYxUzSVAzk2ptXiNEL+4bDBo9wNC43G/osLA/EOGzG4CuNRFnQyIHfkRgQ==} | ||
| '@next/swc-win32-arm64-msvc@15.3.5': | ||
| resolution: {integrity: sha512-h04/7iMEUSMY6fDGCvdanKqlO1qYvzNxntZlCzfE8i5P0uqzVQWQquU1TIhlz0VqGQGXLrFDuTJVONpqGqjGKQ==} | ||
| engines: {node: '>= 10'} | ||
| cpu: [arm64] | ||
| os: [win32] | ||
|
|
||
| '@next/swc-win32-x64-msvc@15.3.0': | ||
| resolution: {integrity: sha512-vHUQS4YVGJPmpjn7r5lEZuMhK5UQBNBRSB+iGDvJjaNk649pTIcRluDWNb9siunyLLiu/LDPHfvxBtNamyuLTw==} | ||
| '@next/swc-win32-x64-msvc@15.3.5': | ||
| resolution: {integrity: sha512-5fhH6fccXxnX2KhllnGhkYMndhOiLOLEiVGYjP2nizqeGWkN10sA9taATlXwake2E2XMvYZjjz0Uj7T0y+z1yw==} |
Copilot
AI
Dec 14, 2025
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Version inconsistency detected: The main Next.js package is being updated to version 15.3.8, but all the platform-specific SWC packages (@next/swc-*) are being updated to version 15.3.5 instead. These should match the main Next.js version (15.3.8) to ensure compatibility and that all components include the security patches for the CVE vulnerabilities mentioned in this PR.
| '@next/swc-darwin-arm64': 15.3.5 | ||
| '@next/swc-darwin-x64': 15.3.5 | ||
| '@next/swc-linux-arm64-gnu': 15.3.5 | ||
| '@next/swc-linux-arm64-musl': 15.3.5 | ||
| '@next/swc-linux-x64-gnu': 15.3.5 | ||
| '@next/swc-linux-x64-musl': 15.3.5 | ||
| '@next/swc-win32-arm64-msvc': 15.3.5 | ||
| '@next/swc-win32-x64-msvc': 15.3.5 |
Copilot
AI
Dec 14, 2025
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Version inconsistency in snapshots section: The SWC platform packages are listed as version 15.3.5, but they should match the main Next.js version 15.3.8 to ensure all security patches are applied consistently across the entire Next.js installation.
| '@next/swc-darwin-arm64': 15.3.5 | |
| '@next/swc-darwin-x64': 15.3.5 | |
| '@next/swc-linux-arm64-gnu': 15.3.5 | |
| '@next/swc-linux-arm64-musl': 15.3.5 | |
| '@next/swc-linux-x64-gnu': 15.3.5 | |
| '@next/swc-linux-x64-musl': 15.3.5 | |
| '@next/swc-win32-arm64-msvc': 15.3.5 | |
| '@next/swc-win32-x64-msvc': 15.3.5 | |
| '@next/swc-darwin-arm64': 15.3.8 | |
| '@next/swc-darwin-x64': 15.3.8 | |
| '@next/swc-linux-arm64-gnu': 15.3.8 | |
| '@next/swc-linux-arm64-musl': 15.3.8 | |
| '@next/swc-linux-x64-gnu': 15.3.8 | |
| '@next/swc-linux-x64-musl': 15.3.8 | |
| '@next/swc-win32-arm64-msvc': 15.3.8 | |
| '@next/swc-win32-x64-msvc': 15.3.8 |
Important
This is an automatic PR generated by Vercel to help you with patching efforts. We can't guarantee it's comprehensive, and it may contain mistakes. Please review our guidance before merging these changes.
A critical remote code execution (RCE) vulnerability in React Server Components, impacting frameworks such as Next.js, was identified in the project sortable. The vulnerability enables unauthenticated RCE on the server via insecure deserialization in the React Flight protocol.
This issue is tracked under:
This automated pull request upgrades the affected React and Next.js packages to patched versions that fully remediate the issue.
More Info | security@vercel.com