Skip to content

Conversation

@vercel
Copy link
Contributor

@vercel vercel bot commented Dec 13, 2025

Important

This is an automatic PR generated by Vercel to help you with patching efforts. We can't guarantee it's comprehensive, and it may contain mistakes. Please review our guidance before merging these changes.

A critical remote code execution (RCE) vulnerability in React Server Components, impacting frameworks such as Next.js, was identified in the project portfolio-3-0. The vulnerability enables unauthenticated RCE on the server via insecure deserialization in the React Flight protocol.

This issue is tracked under:

This automated pull request upgrades the affected React and Next.js packages to patched versions that fully remediate the issue.

More Info | [email protected]


Important

Update next package to 16.0.10 in package.json to fix RCE vulnerability in React Server Components.

  • Security Fix:
    • Updates next package from 16.0.5 to 16.0.10 in package.json to address RCE vulnerability in React Server Components.
    • Vulnerability tracked under GitHub Security Advisory [GHSA-9qr9-h5gf-34mp], React Advisory [CVE-2025-55182], and Next.js Advisory [CVE-2025-66478].

This description was created by Ellipsis for c77b3ac. You can customize this summary. It will automatically update as commits are pushed.

Updated dependencies to fix Next.js and React CVE vulnerabilities.

The fix-react2shell-next tool automatically updated the following packages to their secure versions:
- next
- react-server-dom-webpack
- react-server-dom-parcel  
- react-server-dom-turbopack

All package.json files have been scanned and vulnerable versions have been patched to the correct fixed versions based on the official React advisory.

Co-authored-by: Vercel <vercel[bot]@users.noreply.github.com>
@vercel
Copy link
Contributor Author

vercel bot commented Dec 13, 2025

The latest updates on your projects. Learn more about Vercel for GitHub.

Project Deployment Review Updated (UTC)
portfolio-3-0 Ready Ready Preview, Comment Dec 13, 2025 3:01pm

@vignesh-gupta vignesh-gupta marked this pull request as ready for review December 13, 2025 15:01
@vignesh-gupta vignesh-gupta merged commit a4c5f39 into master Dec 13, 2025
3 of 6 checks passed
@vignesh-gupta vignesh-gupta deleted the vercel/react-server-components-cve-vu-hsub5n branch December 13, 2025 15:01
Copy link

@ellipsis-dev ellipsis-dev bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Important

Looks good to me! 👍

Reviewed everything up to c77b3ac in 27 seconds. Click for details.
  • Reviewed 13 lines of code in 1 files
  • Skipped 1 files when reviewing.
  • Skipped posting 1 draft comments. View those below.
  • Modify your settings and rules to customize what types of comments Ellipsis leaves. And don't forget to react with 👍 or 👎 to teach Ellipsis.
1. package.json:36
  • Draft comment:
    Upgrade Next.js from 16.0.5 to 16.0.10 to address the React Server Components RCE vulnerability. Verify if eslint-config-next should also be updated to maintain consistency.
  • Reason this comment was not posted:
    Comment did not seem useful. Confidence is useful = 50% <= threshold 50% The comment suggests upgrading Next.js to address a specific vulnerability, which is a valid concern. However, it also asks the author to verify if another package should be updated for consistency, which is not allowed by the rules. The first part of the comment is useful, but the second part violates the rules.

Workflow ID: wflow_2TbWjF89jEnwdy1j

You can customize Ellipsis by changing your verbosity settings, reacting with 👍 or 👎, replying to comments, or adding code review rules.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants