-
Notifications
You must be signed in to change notification settings - Fork 0
fix(deps): update dependency next to v15.2.3 [security] - autoclosed #149
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
|
|
Review or Edit in CodeSandboxOpen the branch in Web Editor • VS Code • Insiders |
Reviewer's Guide by SourceryThis pull request updates the nextjs dependency from version 15.1.5 to 15.2.3. This update addresses a security vulnerability (CVE-2025-29927) where authorization checks in Next.js middleware could be bypassed. Review the linked security advisory for more details on the vulnerability and its potential impact. Sequence diagram for middleware authorization check before and after fixsequenceDiagram
participant User
participant Next.js Middleware
participant Application Logic
alt Before Fix (v15.1.5)
User->>Next.js Middleware: Request with x-middleware-subrequest header
Next.js Middleware->>Application Logic: Proceeds without proper authorization check
Application Logic-->>Next.js Middleware: Response
Next.js Middleware-->>User: Response
else After Fix (v15.2.3)
User->>Next.js Middleware: Request with x-middleware-subrequest header
Next.js Middleware->>Next.js Middleware: Check authorization and filter x-middleware-subrequest header
Next.js Middleware->>Application Logic: Proceeds with proper authorization check
Application Logic-->>Next.js Middleware: Response
Next.js Middleware-->>User: Response
end
File-Level Changes
Tips and commandsInteracting with Sourcery
Customizing Your ExperienceAccess your dashboard to:
Getting Help
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
We have skipped reviewing this pull request. It seems to have been created by a bot (hey, renovate[bot]!). We assume it knows what it's doing!
CI Feedback 🧐(Feedback updated until commit a41a89d)A test triggered by this PR failed. Here is an AI-generated analysis of the failure:
|
7eb8640 to
5d239da
Compare
5d239da to
f9cb3e3
Compare
f9cb3e3 to
a41a89d
Compare
a41a89d to
eb60844
Compare
eb60844 to
0584c97
Compare
0584c97 to
8c0cdc7
Compare
7eba892 to
b9b5b53
Compare
b9b5b53 to
805c987
Compare
805c987 to
6e44d51
Compare
6e44d51 to
3c370bb
Compare
This PR contains the following updates:
15.1.5->15.2.3GitHub Vulnerability Alerts
CVE-2025-29927
Impact
It is possible to bypass authorization checks within a Next.js application, if the authorization check occurs in middleware.
Patches
15.2.314.2.2513.5.912.3.5Note: Next.js deployments hosted on Vercel are automatically protected against this vulnerability.
Workaround
If patching to a safe version is infeasible, it is recommend that you prevent external user requests which contain the
x-middleware-subrequestheader from reaching your Next.js application.Credits
CVE-2025-32421
Summary
We received a responsible disclosure from Allam Rachid (zhero) for a low-severity race-condition vulnerability in Next.js. This issue only affects the Pages Router under certain misconfigurations, causing normal endpoints to serve
pagePropsdata instead of standard HTML.Learn more here
Credit
Thank you to Allam Rachid (zhero) for the responsible disclosure. This research was rewarded as part of our bug bounty program.
CVE-2025-48068
Summary
A low-severity vulnerability in Next.js has been fixed in version 15.2.2. This issue may have allowed limited source code exposure when the dev server was running with the App Router enabled. The vulnerability only affects local development environments and requires the user to visit a malicious webpage while
npm run devis active.Because the mitigation is potentially a breaking change for some development setups, to opt-in to the fix, you must configure
allowedDevOriginsin your next config after upgrading to a patched version. Learn more.Learn more: https://vercel.com/changelog/cve-2025-48068
Credit
Thanks to sapphi-red and Radman Siddiki for responsibly disclosing this issue.
CVE-2025-49826
Summary
A vulnerability affecting Next.js has been addressed. It impacted versions 15.0.4 through 15.1.8 and involved a cache poisoning bug leading to a Denial of Service (DoS) condition.
Under certain conditions, this issue may allow a HTTP 204 response to be cached for static pages, leading to the 204 response being served to all users attempting to access the page
More details: CVE-2025-49826
Credits
Release Notes
vercel/next.js (next)
v15.2.3Compare Source
Core Changes
Credits
Huge thanks to @ijjk, @ztanner, and @huozhi for helping!
v15.2.2Compare Source
Core Changes
d55cc79b-20250228to443b7ff2-20250303: #76804443b7ff2-20250303toe03ac20f-20250305: #76842__next_app__module loading functions: #74566e03ac20f-20250305to029e8bd6-20250306: #76870xbutton present: #76898Example Changes
Misc Changes
redirectin client components: #76332labeler.json: #76828SyntaxContextfor__turbopack_esm__: #73544next.browserinstead ofwebdriverin pages/ client-navigation: #76867swc_coretov16.4.0: #76596v1.0.0-alpha.64: #76856__dirname: #76902Credits
Huge thanks to @pranathip, @gaojude, @ijjk, @eps1lon, @Nayeem-XTREME, @leerob, @styfle, @samcx, @sokra, @huozhi, @raunofreiberg, @mischnic, @lubieowoce, @unstubbable, @ztanner, @kdy1, @timneutkens, @wbinnssmith, @bgw, and @oscr for helping!
v15.2.1Compare Source
Core Changes
sourcePackagereferences: #76550revalidateproperty from incremental cachectxforFETCHkind: #76500cache-controlheader and prerender manifest: #762075.8.2: #76709generateStaticParams: #7671322e39ea7-20250225tod55cc79b-20250228: #76680Example Changes
paramscode blocks: #76705Misc Changes
swc_coretov16.0.0: #76414parallel-routes-revalidationtest: #76600octokit.rest.issues.addLabelscall: #76601devIndicatorsand note on deprecated options: #76611htmlLimitedBotsoption: #76616test-turbopack-integrationnot having any shards : #76355describeVariantshelper: #76631toDisplayRedbox(): replace all occurrences of testDir: #76618Credits
Huge thanks to @acdlite, @bgw, @ijjk, @molebox, @kdy1, @timneutkens, @devjiwonchoi, @mischnic, @unstubbable, @eps1lon, @huozhi, @philipithomas, @delbaoliveira, @samcx, @wbinnssmith, @sokra, @gnoff, @leerob, @ztanner, @raunofreiberg, @lubieowoce, and @LihaoWang for helping!
v15.2.0Compare Source
Core Changes
unstable_allowDynamicwhen used with pnpm: #73732.test.files from using error code plugin: #73868react-dev-overlaybefore fork: #74016GroupedStackFrames.tsx: #74028State<T>types into OperationValues and/or NonLocalValues: #74008react-dev-overlayfor new UI: #74017.stories.and.test.files from taskfile watch and error plugin: #740647283a213-20241206to372ec00c-20241209: #73749root-layout-missing-tags-error.tsxto pascal case: #74089bun.lockas package manager lockfile: #74056372ec00c-20241209to518d06d2-20241219: #74155images.qualitiesin next.config: #74257518d06d2-20241219to3b009b4c-20250102: #744923b009b4c-20250102to3ce77d55-20250106: #745573ce77d55-20250106to7b402084-20250107: #745997b402084-20250107to42687267-20250108: #7464942687267-20250108to74ea0c73-20250109: #7469374ea0c73-20250109to056073de-20250109: #74754056073de-20250109to540efebc-20250112: #74805540efebc-20250112tocabd8a0e-20250113: #74828"use cache"in metadata route handlers: #74835cabd8a0e-20250113tob3a95caf-20250113: #74868<Link prefetch={true}>: #74172CMD + .keyboard shortcut to show/hide: #74878b3a95caf-20250113tof0edf41e-20250115: #74890f0edf41e-20250115tob158439a-20250115: #74936b158439a-20250115to5b51a2b9-20250116: #74993waitUntil: #75041colorminfeature fromcssnano: #53393use cacheusage: #750075b51a2b9-20250116to9b62ee71-20250122: #75187afterexport in next-types-plugin: #75190linkheader from middleware with the ones from React: #73431"use cache": #74652Configuration
📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).
🚦 Automerge: Enabled.
♻ Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about these updates again.
This PR was generated by Mend Renovate. View the repository job log.