You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: src/content/blog/2025/12/03/critical-security-vulnerability-in-react-server-components.md
+22-9Lines changed: 22 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -58,27 +58,40 @@ An unauthenticated attacker could craft a malicious HTTP request to any Server F
58
58
59
59
## Update Instructions {/*update-instructions*/}
60
60
61
+
<Note>
62
+
63
+
These instructions have been updated to include the new vulnerabilities:
64
+
65
+
66
+
-**Denial of Service - High Severity**: [CVE-2025-55184](https://www.cve.org/CVERecord?id=CVE-2025-55184) (CVSS 7.5)
67
+
-**Source Code Exposure - Medium Severity**: [CVE-2025-55183](https://www.cve.org/CVERecord?id=CVE-2025-55183) (CVSS 5.3)
68
+
69
+
See the [follow-up blog post](/blog/2025/12/11/denial-of-service-and-source-code-exposure-in-react-server-components) for more info.
70
+
71
+
</Note>
72
+
61
73
### Next.js {/*update-next-js*/}
62
74
63
75
All users should upgrade to the latest patched version in their release line:
64
76
65
77
```bash
66
-
npm install next@15.0.5 // for 15.0.x
67
-
npm install next@15.1.9 // for 15.1.x
68
-
npm install next@15.2.6 // for 15.2.x
69
-
npm install next@15.3.6 // for 15.3.x
70
-
npm install next@15.4.8 // for 15.4.x
71
-
npm install next@15.5.7 // for 15.5.x
72
-
npm install next@16.0.7 // for 16.0.x
78
+
npm install next@14.2.34 // for 14.x
79
+
npm install next@15.0.6 // for 15.0.x
80
+
npm install next@15.1.10 // for 15.1.x
81
+
npm install next@15.2.7 // for 15.2.x
82
+
npm install next@15.3.7 // for 15.3.x
83
+
npm install next@15.4.9 // for 15.4.x
84
+
npm install next@15.5.8 // for 15.5.x
85
+
npm install next@16.0.9 // for 16.0.x
73
86
```
74
87
75
-
If you are on Next.js 14.3.0-canary.77 or a later canary release, downgrade to the latest stable 14.x release:
88
+
If you are on `next@14.3.0-canary.77` or a later canary release, downgrade to the latest stable 14.x release:
76
89
77
90
```bash
78
91
npm install next@14
79
92
```
80
93
81
-
See the [Next.js changelog](https://nextjs.org/blog/CVE-2025-66478) for more info.
94
+
See the [Next.js blog](https://nextjs.org/blog/security-update-2025-12-11) for the latest update instructions and the [previous changelog](https://nextjs.org/blog/CVE-2025-66478) for more info.
Copy file name to clipboardExpand all lines: src/content/blog/2025/12/11/denial-of-service-and-source-code-exposure-in-react-server-components.md
+9-10Lines changed: 9 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -26,20 +26,15 @@ The new vulnerabilities are disclosed as:
26
26
-**Denial of Service - High Severity**: [CVE-2025-55184](https://www.cve.org/CVERecord?id=CVE-2025-55184) (CVSS 7.5)
27
27
-**Source Code Exposure - Medium Severity**: [CVE-2025-55183](https://www.cve.org/CVERecord?id=CVE-2025-55183) (CVSS 5.3)
28
28
29
-
These issues are present in the patches published last week.
30
-
31
29
We recommend upgrading immediately due to the severity of the newly disclosed vulnerabilities.
32
30
33
-
34
31
<Note>
35
32
36
-
#### It’s common for critical CVEs to uncover follow‑up vulnerabilities. {/*its-common-for-critical-cves-to-uncover-followup-vulnerabilities*/}
37
-
38
-
When a critical vulnerability is disclosed, researchers scrutinize adjacent code paths looking for variant exploit techniques to test whether the initial mitigation can be bypassed.
33
+
#### The patches published last week are vulnerable. {/*the-patches-published-last-week-are-vulnerable*/}
39
34
40
-
This pattern shows up across the industry, not just in JavaScript. For example, after [Log4Shell](https://nvd.nist.gov/vuln/detail/cve-2021-44228), additional CVEs ([1](https://nvd.nist.gov/vuln/detail/cve-2021-45046), [2](https://nvd.nist.gov/vuln/detail/cve-2021-45105)) were reported as the community probed the original fix.
35
+
If you already updated for the Critical Security Vulnerability, you will need to update again.
41
36
42
-
Additional disclosures can be frustrating, but they are generally a sign of a healthy response cycle.
37
+
Please see [the instructions in the previous post](/blog/2025/12/03/critical-security-vulnerability-in-react-server-components#update-instructions) for upgrade steps.
43
38
44
39
</Note>
45
40
@@ -61,9 +56,13 @@ As before, if your app’s React code does not use a server, your app is not aff
61
56
62
57
<Note>
63
58
64
-
#### The patches published last week are vulnerable. {/*the-patches-published-last-week-are-vulnerable*/}
59
+
#### It’s common for critical CVEs to uncover follow‑up vulnerabilities. {/*its-common-for-critical-cves-to-uncover-followup-vulnerabilities*/}
65
60
66
-
If you already updated for the Critical Security Vulnerability, you will need to update again.
61
+
When a critical vulnerability is disclosed, researchers scrutinize adjacent code paths looking for variant exploit techniques to test whether the initial mitigation can be bypassed.
62
+
63
+
This pattern shows up across the industry, not just in JavaScript. For example, after [Log4Shell](https://nvd.nist.gov/vuln/detail/cve-2021-44228), additional CVEs ([1](https://nvd.nist.gov/vuln/detail/cve-2021-45046), [2](https://nvd.nist.gov/vuln/detail/cve-2021-45105)) were reported as the community probed the original fix.
64
+
65
+
Additional disclosures can be frustrating, but they are generally a sign of a healthy response cycle.
0 commit comments