Summary
next@15.5.3 (pinned in package.json) is affected by a critical remote code execution vulnerability in the React flight protocol.
- Advisory: GHSA-9qr9-h5gf-34mp
- Severity: Critical (CVSS 9.1)
- Affected range:
10.0.0 - 15.5.9
- Fixed in:
15.5.10+
There are also 4 additional advisories affecting this version range (2 high, 2 moderate):
Fix
Bump next in package.json:
- "next": "15.5.3",
+ "next": "15.5.12",
Also bump eslint-config-next to match:
- "eslint-config-next": "15.5.3",
+ "eslint-config-next": "15.5.12",
This is a non-breaking patch release.
How I found this
Ran npm audit against the lockfile. The RCE is the only critical finding; the others are included for completeness since they're all resolved by the same version bump.
Summary
next@15.5.3(pinned inpackage.json) is affected by a critical remote code execution vulnerability in the React flight protocol.10.0.0 - 15.5.915.5.10+There are also 4 additional advisories affecting this version range (2 high, 2 moderate):
Fix
Bump
nextinpackage.json:Also bump
eslint-config-nextto match:This is a non-breaking patch release.
How I found this
Ran
npm auditagainst the lockfile. The RCE is the only critical finding; the others are included for completeness since they're all resolved by the same version bump.