Skip to content

Commit 1e74023

Browse files
[Blog] Update safe Next.js versions (#8199)
1 parent 9527378 commit 1e74023

File tree

1 file changed

+16
-11
lines changed

1 file changed

+16
-11
lines changed

src/content/blog/2025/12/03/critical-security-vulnerability-in-react-server-components.md

Lines changed: 16 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -20,9 +20,9 @@ We recommend upgrading immediately.
2020

2121
---
2222

23-
On November 29th, Lachlan Davidson reported a security vulnerability in React that allows unauthenticated remote code execution by exploiting a flaw in how React decodes payloads sent to React Server Function endpoints.
23+
On November 29th, Lachlan Davidson reported a security vulnerability in React that allows unauthenticated remote code execution by exploiting a flaw in how React decodes payloads sent to React Server Function endpoints.
2424

25-
Even if your app does not implement any React Server Function endpoints it may still be vulnerable if your app supports React Server Components.
25+
Even if your app does not implement any React Server Function endpoints it may still be vulnerable if your app supports React Server Components.
2626

2727
This vulnerability was disclosed as [CVE-2025-55182](https://www.cve.org/CVERecord?id=CVE-2025-55182) and is rated CVSS 10.0.
2828

@@ -40,7 +40,7 @@ If your app’s React code does not use a server, your app is not affected by th
4040

4141
### Affected frameworks and bundlers {/*affected-frameworks-and-bundlers*/}
4242

43-
Some React frameworks and bundlers depended on, had peer dependencies for, or included the vulnerable React packages. The following React frameworks & bundlers are affected: [next](https://www.npmjs.com/package/next), [react-router](https://www.npmjs.com/package/react-router), [waku](https://www.npmjs.com/package/waku), [@parcel/rsc](https://www.npmjs.com/package/@parcel/rsc), [@vitejs/plugin-rsc](https://www.npmjs.com/package/@vitejs/plugin-rsc), and [rwsdk](https://www.npmjs.com/package/rwsdk).
43+
Some React frameworks and bundlers depended on, had peer dependencies for, or included the vulnerable React packages. The following React frameworks & bundlers are affected: [next](https://www.npmjs.com/package/next), [react-router](https://www.npmjs.com/package/react-router), [waku](https://www.npmjs.com/package/waku), [@parcel/rsc](https://www.npmjs.com/package/@parcel/rsc), [@vitejs/plugin-rsc](https://www.npmjs.com/package/@vitejs/plugin-rsc), and [rwsdk](https://www.npmjs.com/package/rwsdk).
4444

4545
See the [update instructions below](#update-instructions) for how to upgrade to these patches.
4646

@@ -76,16 +76,21 @@ See the [follow-up blog post](/blog/2025/12/11/denial-of-service-and-source-code
7676
All users should upgrade to the latest patched version in their release line:
7777

7878
```bash
79-
npm install [email protected] // for 14.x
80-
npm install [email protected] // for 15.0.x
81-
npm install [email protected] // for 15.1.x
82-
npm install [email protected] // for 15.2.x
83-
npm install [email protected] // for 15.3.x
84-
npm install [email protected] // for 15.4.x
85-
npm install [email protected] // for 15.5.x
86-
npm install [email protected] // for 16.0.x
79+
npm install [email protected] // for 13.3.x, 13.4.x, 13.5.x, 14.x
80+
npm install [email protected] // for 15.0.x
81+
npm install [email protected] // for 15.1.x
82+
npm install [email protected] // for 15.2.x
83+
npm install [email protected] // for 15.3.x
84+
npm install [email protected] // for 15.4.x
85+
npm install [email protected] // for 15.5.x
86+
npm install [email protected] // for 16.0.x
87+
88+
npm install [email protected] // for 15.x canary releases
89+
npm install [email protected] // for 16.x canary releases
8790
```
8891

92+
If you are on version `13.3` or later version of Next.js 13 (`13.3.x`, `13.4.x`, or `13.5.x`) please upgrade to version `14.2.35`.
93+
8994
If you are on `[email protected]` or a later canary release, downgrade to the latest stable 14.x release:
9095

9196
```bash

0 commit comments

Comments
 (0)