16.1.6
14 years ago
1 months ago
Known vulnerabilities in the next package. This does not include vulnerabilities belonging to this package’s dependencies.
Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.
Fix for free| Vulnerability | Vulnerable Version |
|---|---|
next is a react framework. Affected versions of this package are vulnerable to Allocation of Resources Without Limits or Throttling via the Partial Prerendering resume endpoint when unauthenticated POST requests with the Note: This is only exploitable if the application is running with How to fix Allocation of Resources Without Limits or Throttling? Upgrade | >=15.0.0-canary.0 <15.6.0-canary.61>=16.0.0-beta.0 <16.1.1-canary.16>=16.1.1 <16.1.5 |
next is a react framework. Affected versions of this package are vulnerable to Allocation of Resources Without Limits or Throttling via the Note: This is only exploitable if How to fix Allocation of Resources Without Limits or Throttling? Upgrade | >=10.0.0 <15.5.10>=16.0.0-beta.0 <16.1.1-canary.15>=16.1.1 <16.1.5 |
next is a react framework. Affected versions of this package are vulnerable to Exposure of Sensitive System Information to an Unauthorized Control Sphere. An attacker can access the source code of any Server Function by sending a malicious HTTP request to a vulnerable Server Function. Notes: This is only exploitable if a Server Function exists that explicitly or implicitly exposes a stringified argument:
An attacker may be able to leak the following:
Secrets hardcoded in source code may be exposed, but runtime secrets such as The scope of the exposed code is limited to the code inside the Server Function, which may include other functions depending on the amount of inlining your bundler provides. Even if your app does not implement any React Server Function endpoints it may still be vulnerable if your app supports React Server Components. If your app’s React code does not use a server, your app is not affected by these vulnerabilities. If your app does not use a framework, bundler, or bundler plugin that supports React Server Components, your app is not affected by these vulnerabilities. For React Native users not using a monorepo or If you are using React Native in a monorepo, you should update only the impacted packages if they are installed: How to fix Exposure of Sensitive System Information to an Unauthorized Control Sphere? Upgrade | >=15.0.0-rc.0 <15.0.6>=15.1.0 <15.1.10>=15.2.0-canary.0 <15.2.7>=15.3.0-canary.0 <15.3.7>=15.4.0-canary.0 <15.4.9>=15.5.0 <15.5.8>=16.0.0-beta.0 <16.0.9>=16.1.0-canary.0 <16.1.0-canary.19 |
next is a react framework. Affected versions of this package are vulnerable to Deserialization of Untrusted Data due to unsafe deserialization of payloads from HTTP requests to Server Function endpoints. An attacker can cause the server process to enter an infinite loop and hang, preventing it from serving future HTTP requests by sending specially crafted payloads. Note: This is caused by an incomplete fix for CVE-2025-55184. How to fix Deserialization of Untrusted Data? Upgrade | >=14.2.34 <14.2.35>=15.0.6 <15.0.7>=15.1.10 <15.1.11>=15.2.7 <15.2.8>=15.3.7 <15.3.8>=15.4.9 <15.4.10>=15.5.8 <15.5.9>=16.0.9 <16.0.10>=16.1.0-canary.0 <16.1.0-canary.19 |
next is a react framework. Affected versions of this package are vulnerable to Deserialization of Untrusted Data due to unsafe deserialization of payloads from HTTP requests to Server Function endpoints. An attacker can cause the server process to enter an infinite loop and hang, preventing it from serving future HTTP requests by sending specially crafted payloads. Notes: Even if your app does not implement any React Server Function endpoints it may still be vulnerable if your app supports React Server Components. If your app’s React code does not use a server, your app is not affected by these vulnerabilities. If your app does not use a framework, bundler, or bundler plugin that supports React Server Components, your app is not affected by these vulnerabilities. For React Native users not using a monorepo or If you are using React Native in a monorepo, you should update only the impacted packages if they are installed: How to fix Deserialization of Untrusted Data? Upgrade | >=13.3.0 <14.2.34>=15.0.0-rc.0 <15.0.6>=15.1.0 <15.1.10>=15.2.0-canary.0 <15.2.7>=15.3.0-canary.0 <15.3.7>=15.4.0-canary.0 <15.4.9>=15.5.0 <15.5.8>=16.0.0-beta.0 <16.0.9>=16.1.0-canary.0 <16.1.0-canary.19 |