-
Notifications
You must be signed in to change notification settings - Fork 412
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Enforce nextjs peerDependency to 12.3.5, 13.5.9, 14.2.25 and 15.2.3 #1989
Conversation
Marked as draft for now, to wait for v12. But if this isnt available soon, we can consider merging this, and fix v12 in a follow up. |
package.json
Outdated
@@ -131,7 +131,7 @@ | |||
"url-join": "^4.0.1" | |||
}, | |||
"peerDependencies": { | |||
"next": ">=10" | |||
"next": "^10.0.0 || ^11.0.0 || ^12.0.0 || ^13.5.9 || ^14.2.25 || ^15.2.3" |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
As versions between 11.1.4 and 13.5.6 are also affected, will ^11.0.0 and ^12.0.0 not pick affected versions? Removing support could be breaking change but will keeping them still make us vulnerable ?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
^ only matches minor and patch versions, meaning ^12.0.0
is saying anything in the range 12.x.x
, so not 13
.
Fix for v12 is merged and released in v12.3.2: vercel/next.js#77424 |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM
📋 Changes
With this PR, I am proposing to update the peerDependencies to ensure users use a version of NextJS that isn't vulnerable to GHSA-f82v-jwr5-mffw when using v3 of our SDK.
Looking at the advisory and the nextjs blog, we can see the issue is fixed in nextjs 12.3.5, 13.5.9, 14.2.25 and 15.2.3.
This would technically be a breaking change, but as this SDK relies on authorization in middleware, I think we should release this as a minor version bump.
A more in-depth write-up of the issue is available here.
📎 References
GHSA-f82v-jwr5-mffw
https://nextjs.org/blog/cve-2025-29927
https://zeropath.com/blog/nextjs-middleware-cve-2025-29927-auth-bypass
🎯 Testing
N/A