next@16.1.0-canary.18 vulnerabilities

The React Framework

  • latest version

    16.1.6

  • latest non vulnerable version

  • first published

    14 years ago

  • latest version published

    1 months ago

  • licenses detected

  • Direct Vulnerabilities

    Known vulnerabilities in the next package. This does not include vulnerabilities belonging to this package’s dependencies.

    Fix vulnerabilities automatically

    Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

    Fix for free
    VulnerabilityVulnerable Version
    • H
    Allocation of Resources Without Limits or Throttling

    next is a react framework.

    Affected versions of this package are vulnerable to Allocation of Resources Without Limits or Throttling via the Partial Prerendering resume endpoint when unauthenticated POST requests with the Next-Resume: 1 header are processed and attacker-controlled postponed state data is handled. An attacker can cause the server process to crash and exhaust system memory by sending large or highly compressed payloads that are buffered or decompressed without size limits.

    Note:

    This is only exploitable if the application is running with experimental.ppr: true or cacheComponents: true configured along with the NEXT_PRIVATE_MINIMAL_MODE=1 environment variable.

    How to fix Allocation of Resources Without Limits or Throttling?

    Upgrade next to version 15.6.0-canary.61, 16.1.1-canary.16, 16.1.5 or higher.

    >=15.0.0-canary.0 <15.6.0-canary.61>=16.0.0-beta.0 <16.1.1-canary.16>=16.1.1 <16.1.5
    • H
    Allocation of Resources Without Limits or Throttling

    next is a react framework.

    Affected versions of this package are vulnerable to Allocation of Resources Without Limits or Throttling via the fetchExternalImage() function, which is used for image optimization and loads external images into memory without a maximum size limit. An attacker can exhaust system memory and disrupt service availability by requesting optimization of very large images from external domains.

    Note:

    This is only exploitable if remotePatterns is configured to allow image optimization from external domains and the attacker can serve or control a large image on an allowed domain.

    How to fix Allocation of Resources Without Limits or Throttling?

    Upgrade next to version 15.5.10, 16.1.1-canary.15, 16.1.5 or higher.

    >=10.0.0 <15.5.10>=16.0.0-beta.0 <16.1.1-canary.15>=16.1.1 <16.1.5
    • M
    Exposure of Sensitive System Information to an Unauthorized Control Sphere

    next is a react framework.

    Affected versions of this package are vulnerable to Exposure of Sensitive System Information to an Unauthorized Control Sphere. An attacker can access the source code of any Server Function by sending a malicious HTTP request to a vulnerable Server Function.

    Notes:

    This is only exploitable if a Server Function exists that explicitly or implicitly exposes a stringified argument:

    'use server';
    
    export async function serverFunction(name) {
      const conn = db.createConnection('SECRET KEY');
      const user = await conn.createUser(name); // implicitly stringified, leaked in db
    
      return {
       id: user.id,
       message: `Hello, ${name}!` // explicitly stringified, leaked in reply
      }}
    

    An attacker may be able to leak the following:

    0:{"a":"$@1","f":"","b":"Wy43RxUKdxmr5iuBzJ1pN"}
    1:{"id":"tva1sfodwq","message":"Hello, async function(a){console.log(\"serverFunction\");let b=i.createConnection(\"SECRET KEY\");return{id:(await b.createUser(a)).id,message:`Hello, ${a}!`}}!"}
    

    Secrets hardcoded in source code may be exposed, but runtime secrets such as process.env.SECRET are not affected.

    The scope of the exposed code is limited to the code inside the Server Function, which may include other functions depending on the amount of inlining your bundler provides.

    Even if your app does not implement any React Server Function endpoints it may still be vulnerable if your app supports React Server Components.

    If your app’s React code does not use a server, your app is not affected by these vulnerabilities. If your app does not use a framework, bundler, or bundler plugin that supports React Server Components, your app is not affected by these vulnerabilities.

    For React Native users not using a monorepo or react-dom, your react version should be pinned in your package.json, and there are no additional steps needed.

    If you are using React Native in a monorepo, you should update only the impacted packages if they are installed: react-server-dom-webpack, react-server-dom-parcel, react-server-dom-turbopack. This is required to mitigate the security advisories, but you do not need to update react and react-dom so this will not cause the version mismatch error in React Native. See this issue for more information.

    How to fix Exposure of Sensitive System Information to an Unauthorized Control Sphere?

    Upgrade next to version 15.0.6, 15.1.10, 15.2.7, 15.3.7, 15.4.9, 15.5.8, 16.0.9, 16.1.0-canary.19 or higher.

    >=15.0.0-rc.0 <15.0.6>=15.1.0 <15.1.10>=15.2.0-canary.0 <15.2.7>=15.3.0-canary.0 <15.3.7>=15.4.0-canary.0 <15.4.9>=15.5.0 <15.5.8>=16.0.0-beta.0 <16.0.9>=16.1.0-canary.0 <16.1.0-canary.19
    • H
    Deserialization of Untrusted Data

    next is a react framework.

    Affected versions of this package are vulnerable to Deserialization of Untrusted Data due to unsafe deserialization of payloads from HTTP requests to Server Function endpoints. An attacker can cause the server process to enter an infinite loop and hang, preventing it from serving future HTTP requests by sending specially crafted payloads.

    Note:

    This is caused by an incomplete fix for CVE-2025-55184.

    How to fix Deserialization of Untrusted Data?

    Upgrade next to version 14.2.35, 15.0.7, 15.1.11, 15.2.8, 15.3.8, 15.4.10, 15.5.9, 16.0.10, 16.1.0-canary.19 or higher.

    >=14.2.34 <14.2.35>=15.0.6 <15.0.7>=15.1.10 <15.1.11>=15.2.7 <15.2.8>=15.3.7 <15.3.8>=15.4.9 <15.4.10>=15.5.8 <15.5.9>=16.0.9 <16.0.10>=16.1.0-canary.0 <16.1.0-canary.19
    • H
    Deserialization of Untrusted Data

    next is a react framework.

    Affected versions of this package are vulnerable to Deserialization of Untrusted Data due to unsafe deserialization of payloads from HTTP requests to Server Function endpoints. An attacker can cause the server process to enter an infinite loop and hang, preventing it from serving future HTTP requests by sending specially crafted payloads.

    Notes:

    Even if your app does not implement any React Server Function endpoints it may still be vulnerable if your app supports React Server Components.

    If your app’s React code does not use a server, your app is not affected by these vulnerabilities. If your app does not use a framework, bundler, or bundler plugin that supports React Server Components, your app is not affected by these vulnerabilities.

    For React Native users not using a monorepo or react-dom, your react version should be pinned in your package.json, and there are no additional steps needed.

    If you are using React Native in a monorepo, you should update only the impacted packages if they are installed: react-server-dom-webpack, react-server-dom-parcel, react-server-dom-turbopack. This is required to mitigate the security advisories, but you do not need to update react and react-dom so this will not cause the version mismatch error in React Native. See this issue for more information.

    How to fix Deserialization of Untrusted Data?

    Upgrade next to version 14.2.34, 15.0.6, 15.1.10, 15.2.7, 15.3.7, 15.4.9, 15.5.8, 16.0.9, 16.1.0-canary.19 or higher.

    >=13.3.0 <14.2.34>=15.0.0-rc.0 <15.0.6>=15.1.0 <15.1.10>=15.2.0-canary.0 <15.2.7>=15.3.0-canary.0 <15.3.7>=15.4.0-canary.0 <15.4.9>=15.5.0 <15.5.8>=16.0.0-beta.0 <16.0.9>=16.1.0-canary.0 <16.1.0-canary.19