Skip to content

Commit 72f8998

Browse files
authored
Update instructions (#8195)
1 parent 1a955f0 commit 72f8998

File tree

2 files changed

+31
-19
lines changed

2 files changed

+31
-19
lines changed

src/content/blog/2025/12/03/critical-security-vulnerability-in-react-server-components.md

Lines changed: 22 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -58,27 +58,40 @@ An unauthenticated attacker could craft a malicious HTTP request to any Server F
5858

5959
## Update Instructions {/*update-instructions*/}
6060

61+
<Note>
62+
63+
These instructions have been updated to include the new vulnerabilities:
64+
65+
66+
- **Denial of Service - High Severity**: [CVE-2025-55184](https://www.cve.org/CVERecord?id=CVE-2025-55184) (CVSS 7.5)
67+
- **Source Code Exposure - Medium Severity**: [CVE-2025-55183](https://www.cve.org/CVERecord?id=CVE-2025-55183) (CVSS 5.3)
68+
69+
See the [follow-up blog post](/blog/2025/12/11/denial-of-service-and-source-code-exposure-in-react-server-components) for more info.
70+
71+
</Note>
72+
6173
### Next.js {/*update-next-js*/}
6274

6375
All users should upgrade to the latest patched version in their release line:
6476

6577
```bash
66-
npm install next@15.0.5 // for 15.0.x
67-
npm install next@15.1.9 // for 15.1.x
68-
npm install next@15.2.6 // for 15.2.x
69-
npm install next@15.3.6 // for 15.3.x
70-
npm install next@15.4.8 // for 15.4.x
71-
npm install next@15.5.7 // for 15.5.x
72-
npm install next@16.0.7 // for 16.0.x
78+
npm install next@14.2.34 // for 14.x
79+
npm install next@15.0.6 // for 15.0.x
80+
npm install next@15.1.10 // for 15.1.x
81+
npm install next@15.2.7 // for 15.2.x
82+
npm install next@15.3.7 // for 15.3.x
83+
npm install next@15.4.9 // for 15.4.x
84+
npm install next@15.5.8 // for 15.5.x
85+
npm install next@16.0.9 // for 16.0.x
7386
```
7487

75-
If you are on Next.js 14.3.0-canary.77 or a later canary release, downgrade to the latest stable 14.x release:
88+
If you are on `next@14.3.0-canary.77` or a later canary release, downgrade to the latest stable 14.x release:
7689

7790
```bash
7891
npm install next@14
7992
```
8093

81-
See the [Next.js changelog](https://nextjs.org/blog/CVE-2025-66478) for more info.
94+
See the [Next.js blog](https://nextjs.org/blog/security-update-2025-12-11) for the latest update instructions and the [previous changelog](https://nextjs.org/blog/CVE-2025-66478) for more info.
8295

8396
### React Router {/*update-react-router*/}
8497

src/content/blog/2025/12/11/denial-of-service-and-source-code-exposure-in-react-server-components.md

Lines changed: 9 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -26,20 +26,15 @@ The new vulnerabilities are disclosed as:
2626
- **Denial of Service - High Severity**: [CVE-2025-55184](https://www.cve.org/CVERecord?id=CVE-2025-55184) (CVSS 7.5)
2727
- **Source Code Exposure - Medium Severity**: [CVE-2025-55183](https://www.cve.org/CVERecord?id=CVE-2025-55183) (CVSS 5.3)
2828

29-
These issues are present in the patches published last week.
30-
3129
We recommend upgrading immediately due to the severity of the newly disclosed vulnerabilities.
3230

33-
3431
<Note>
3532

36-
#### It’s common for critical CVEs to uncover follow‑up vulnerabilities. {/*its-common-for-critical-cves-to-uncover-followup-vulnerabilities*/}
37-
38-
When a critical vulnerability is disclosed, researchers scrutinize adjacent code paths looking for variant exploit techniques to test whether the initial mitigation can be bypassed.
33+
#### The patches published last week are vulnerable. {/*the-patches-published-last-week-are-vulnerable*/}
3934

40-
This pattern shows up across the industry, not just in JavaScript. For example, after [Log4Shell](https://nvd.nist.gov/vuln/detail/cve-2021-44228), additional CVEs ([1](https://nvd.nist.gov/vuln/detail/cve-2021-45046), [2](https://nvd.nist.gov/vuln/detail/cve-2021-45105)) were reported as the community probed the original fix.
35+
If you already updated for the Critical Security Vulnerability, you will need to update again.
4136

42-
Additional disclosures can be frustrating, but they are generally a sign of a healthy response cycle.
37+
Please see [the instructions in the previous post](/blog/2025/12/03/critical-security-vulnerability-in-react-server-components#update-instructions) for upgrade steps.
4338

4439
</Note>
4540

@@ -61,9 +56,13 @@ As before, if your app’s React code does not use a server, your app is not aff
6156

6257
<Note>
6358

64-
#### The patches published last week are vulnerable. {/*the-patches-published-last-week-are-vulnerable*/}
59+
#### It’s common for critical CVEs to uncover follow‑up vulnerabilities. {/*its-common-for-critical-cves-to-uncover-followup-vulnerabilities*/}
6560

66-
If you already updated for the Critical Security Vulnerability, you will need to update again.
61+
When a critical vulnerability is disclosed, researchers scrutinize adjacent code paths looking for variant exploit techniques to test whether the initial mitigation can be bypassed.
62+
63+
This pattern shows up across the industry, not just in JavaScript. For example, after [Log4Shell](https://nvd.nist.gov/vuln/detail/cve-2021-44228), additional CVEs ([1](https://nvd.nist.gov/vuln/detail/cve-2021-45046), [2](https://nvd.nist.gov/vuln/detail/cve-2021-45105)) were reported as the community probed the original fix.
64+
65+
Additional disclosures can be frustrating, but they are generally a sign of a healthy response cycle.
6766

6867
</Note>
6968

0 commit comments

Comments
 (0)