Update dependency next to v15.2.3 [SECURITY] #152
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
15.1.1
->15.2.3
GitHub Vulnerability Alerts
CVE-2024-56332
Impact
A Denial of Service (DoS) attack allows attackers to construct requests that leaves requests to Server Actions hanging until the hosting provider cancels the function execution.
Note: Next.js server is idle during that time and only keeps the connection open. CPU and memory footprint are low during that time.
Deployments without any protection against long running Server Action invocations are especially vulnerable. Hosting providers like Vercel or Netlify set a default maximum duration on function execution to reduce the risk of excessive billing.
This is the same issue as if the incoming HTTP request has an invalid
Content-Length
header or never closes. If the host has no other mitigations to those then this vulnerability is novel.This vulnerability affects only Next.js deployments using Server Actions.
Patches
This vulnerability was resolved in Next.js 14.2.21, 15.1.2, and 13.5.8. We recommend that users upgrade to a safe version.
Workarounds
There are no official workarounds for this vulnerability.
Credits
Thanks to the PackDraw team for responsibly disclosing this vulnerability.
CVE-2025-29927
Impact
It is possible to bypass authorization checks within a Next.js application, if the authorization check occurs in middleware.
Patches
15.2.3
14.2.25
13.5.9
12.3.5
Note: Next.js deployments hosted on Vercel are automatically protected against this vulnerability.
Workaround
If patching to a safe version is infeasible, it is recommend that you prevent external user requests which contain the
x-middleware-subrequest
header from reaching your Next.js application.Credits
Release Notes
vercel/next.js (next)
v15.2.3
Compare Source
v15.2.2
Compare Source
Core Changes
d55cc79b-20250228
to443b7ff2-20250303
: #76804443b7ff2-20250303
toe03ac20f-20250305
: #76842__next_app__
module loading functions: #74566e03ac20f-20250305
to029e8bd6-20250306
: #76870x
button present: #76898Example Changes
Misc Changes
redirect
in client components: #76332labeler.json
: #76828SyntaxContext
for__turbopack_esm__
: #73544next.browser
instead ofwebdriver
in pages/ client-navigation: #76867swc_core
tov16.4.0
: #76596v1.0.0-alpha.64
: #76856__dirname
: #76902Credits
Huge thanks to @pranathip, @gaojude, @ijjk, @eps1lon, @Nayeem-XTREME, @leerob, @styfle, @samcx, @sokra, @huozhi, @raunofreiberg, @mischnic, @lubieowoce, @unstubbable, @ztanner, @kdy1, @timneutkens, @wbinnssmith, @bgw, and @oscr for helping!
v15.2.1
Compare Source
Core Changes
sourcePackage
references: #76550revalidate
property from incremental cachectx
forFETCH
kind: #76500cache-control
header and prerender manifest: #762075.8.2
: #76709generateStaticParams
: #7671322e39ea7-20250225
tod55cc79b-20250228
: #76680Example Changes
params
code blocks: #76705Misc Changes
swc_core
tov16.0.0
: #76414parallel-routes-revalidation
test: #76600octokit.rest.issues.addLabels
call: #76601devIndicators
and note on deprecated options: #76611htmlLimitedBots
option: #76616test-turbopack-integration
not having any shards : #76355describeVariants
helper: #76631toDisplayRedbox()
: replace all occurrences of testDir: #76618Credits
Huge thanks to @acdlite, @bgw, @ijjk, @molebox, @kdy1, @timneutkens, @devjiwonchoi, @mischnic, @unstubbable, @eps1lon, @huozhi, @philipithomas, @delbaoliveira, @samcx, @wbinnssmith, @sokra, @gnoff, @leerob, @ztanner, @raunofreiberg, @lubieowoce, and @LihaoWang for helping!
v15.2.0
Compare Source
v15.1.7
Compare Source
Core Changes
Credits
Huge thanks to @lubieowoce and @ztanner for helping!
v15.1.6
Compare Source
Core Changes
Credits
Huge thanks to @lubieowoce and @ztanner for helping!
v15.1.5
Compare Source
Core Changes
Credits
Huge thanks to @ijjk, @huozhi, @matmannion and @ztanner for helping!
v15.1.4
Compare Source
Core Changes
Credits
Huge thanks to @ and @ for helping!
v15.1.3
Compare Source
Core Changes
Credits
Huge thanks to @unstubbable and @ztanner for helping!
v15.1.2
Compare Source
Core Changes
7283a21
-20241206 to65e06cb
-20241218: https://github.com/vercel/next.js/pull/74117Credits
Huge thanks to @ztanner for helping!
Configuration
📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR was generated by Mend Renovate. View the repository job log.