Skip to content
This repository was archived by the owner on Feb 27, 2026. It is now read-only.

fix: update Next.js to 15.3.6 to address CVE-2025-51605 (RCE vulnerability)#364

Merged
danielalves96 merged 2 commits intonextfrom
copilot/fix-security-vulnerability-react
Dec 10, 2025
Merged

fix: update Next.js to 15.3.6 to address CVE-2025-51605 (RCE vulnerability)#364
danielalves96 merged 2 commits intonextfrom
copilot/fix-security-vulnerability-react

Conversation

Copy link
Copy Markdown
Contributor

Copilot AI commented Dec 5, 2025

🎯 Please make sure you are opening this Pull Request against the next branch!

📝 Description

Updates Next.js from 15.3.4 to 15.3.6 to patch the critical RCE vulnerability in the React flight protocol (GHSA-9qr9-h5gf-34mp).

Changes:

  • apps/web: next and eslint-config-next → 15.3.6
  • apps/docs: next and eslint-config-next → 15.3.6
  • Updated lock files

🔗 Related Issue(s)

Closes #276

💡 Motivation and Context

Next.js 15.3.4 is vulnerable to RCE via the React flight protocol. Versions >= 15.3.0-canary.0, < 15.3.6 are affected.

References:

🤖 Use of Artificial Intelligence (AI)

  • Did you use any AI tools (such as GitHub Copilot, ChatGPT, etc.) to help develop this PR?
    • No, this PR was developed without the assistance of AI tools.
    • Yes, AI tools assisted in the development of this PR (please specify which ones and how they were used):
      • Tool(s) used: GitHub Copilot
      • Brief description of how AI contributed: Investigated the vulnerability, verified affected versions, and applied the fix
  • Was this PR generated entirely by an AI tool (i.e., with minimal human intervention)?
    • No
    • Yes (please provide details): Generated by GitHub Copilot coding agent

🧪 How Has This Been Tested?

  • GitHub Advisory Database verification confirmed 15.3.6 has no known vulnerabilities
  • Linting passed for both apps
  • Type checking passed for both apps

📸 Screenshots (if appropriate)

N/A - dependency update only

🔄 Types of Changes

Check the relevant option(s) below:

  • 🐛 Bug fix (non-breaking change which fixes an issue)
  • ✨ New feature (non-breaking change which adds functionality)
  • ⚠️ Breaking change (fix or feature that would cause existing functionality to change)
  • 📚 Documentation update

✅ Checklist

  • My code follows the code style of this project
  • I have performed a self-review of my code
  • I have commented my code, particularly in hard-to-understand areas
  • I have added tests that prove my fix is effective or that my feature works
  • I have added necessary documentation (if appropriate)
  • I have rebased and/or merged on top of the latest next branch

🙏 Thank you for your contribution!

Warning

Firewall rules blocked me from connecting to one or more addresses (expand for details)

I tried to connect to the following addresses, but was blocked by firewall rules:

  • fonts.googleapis.com
    • Triggering command: /usr/local/bin/node node /home/REDACTED/work/Palmr/Palmr/apps/docs/node_modules/.bin/../next/dist/bin/next build (dns block)
    • Triggering command: /usr/local/bin/node node /home/REDACTED/work/Palmr/Palmr/apps/web/node_modules/.bin/../next/dist/bin/next build (dns block)

If you need me to access, download, or install something from one of these locations, you can either:

Original prompt

This section details on the original issue you should resolve

<issue_title>Critical Security Vulnerability in React Server Components</issue_title>
<issue_description>Update ASAP

https://react2shell.com/
GHSA-fv66-9v8q-g76r
GHSA-9qr9-h5gf-34mp

Actually not sure that this applies but i will leave this issue open until it is checked.</issue_description>

Comments on the Issue (you are @copilot in this section)


💬 We'd love your input! Share your thoughts on Copilot coding agent in our 2 minute survey.

…HSA-9qr9-h5gf-34mp)

Co-authored-by: danielalves96 <62755605+danielalves96@users.noreply.github.com>
Copilot AI changed the title [WIP] Fix critical security vulnerability in React Server Components fix: update Next.js to 15.3.6 to address CVE-2025-51605 (RCE vulnerability) Dec 5, 2025
Copilot AI requested a review from danielalves96 December 5, 2025 12:29
@danielalves96 danielalves96 marked this pull request as ready for review December 5, 2025 12:45
@sommersdev
Copy link
Copy Markdown

please merge this PR ASAP and publish a new version 🙏

@sommersdev
Copy link
Copy Markdown

sommersdev commented Dec 9, 2025

saw another process that was crypto mining via palmr container. I am stopping Palmr until a new Version with a newer version gets published, so please @danielalves96, merge this PR

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants