Skip to content

Conversation

@vercel
Copy link
Contributor

@vercel vercel bot commented Dec 10, 2025

Important

This is an automatic PR generated by Vercel to help you with patching efforts. We can't guarantee it's comprehensive, and it may contain mistakes. Please review our guidance before merging these changes.

A critical remote code execution (RCE) vulnerability in React Server Components, impacting frameworks such as Next.js, was identified in the project split-simple. The vulnerability enables unauthenticated RCE on the server via insecure deserialization in the React Flight protocol.

This issue is tracked under:

This automated pull request upgrades the affected React and Next.js packages to patched versions that fully remediate the issue.

More Info | security@vercel.com


Note

Bumps Next.js from 15.2.4 to 15.2.6 and updates related lockfile entries and peer packages.

  • Dependencies:
    • Upgrade next from 15.2.4 to 15.2.6 in package.json.
    • Update lockfile to align with next@15.2.6, including @next/env and platform-specific @next/swc-* packages.
    • Refresh peer references in lockfile for packages bound to Next.js (e.g., @vercel/analytics, geist).

Written by Cursor Bugbot for commit 523d0c0. This will update automatically on new commits. Configure here.

Updated dependencies to fix Next.js CVE vulnerabilities.

The fix-react2shell-next tool automatically updated the following packages to their secure versions:
- next
- react-server-dom-webpack
- react-server-dom-parcel  
- react-server-dom-turbopack

All package.json files have been scanned and vulnerable versions have been patched to the correct fixed versions based on the official React advisory.

Co-authored-by: Vercel <vercel[bot]@users.noreply.github.com>
@vercel
Copy link
Contributor Author

vercel bot commented Dec 10, 2025

The latest updates on your projects. Learn more about Vercel for GitHub.

Project Deployment Preview Comments Updated (UTC)
split-simple Ready Ready Preview Comment Dec 10, 2025 3:04pm

@Aarekaz Aarekaz marked this pull request as ready for review December 10, 2025 17:39
@Aarekaz Aarekaz merged commit a5b2e59 into main Dec 10, 2025
5 of 7 checks passed
Copy link

@cursor cursor bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This PR is being reviewed by Cursor Bugbot

Details

You are on the Bugbot Free tier. On this plan, Bugbot will review limited PRs each billing cycle.

To receive Bugbot reviews on all of your PRs, visit the Cursor dashboard to activate Pro and start your 14-day free trial.

"input-otp": "1.4.1",
"lucide-react": "^0.454.0",
"next": "15.2.4",
"next": "15.2.6",
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Bug: Security fix incomplete: vulnerable React version remains

The PR claims to fix the React Server Components RCE vulnerability (CVE-2025-55182) but only upgrades Next.js from 15.2.4 to 15.2.6. The PR description explicitly states the vulnerability affects React versions 19.0.0, 19.1.0, 19.1.1, and 19.2.0, with fixes in React 19.0.1, 19.1.2, etc. However, the react and react-dom dependencies remain at ^19, which resolves to the vulnerable 19.1.1 version in pnpm-lock.yaml. The React packages need to be upgraded to patched versions to fully remediate the RCE vulnerability.

Fix in Cursor Fix in Web

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants