Skip to content

Conversation

renovate[bot]
Copy link
Contributor

@renovate renovate bot commented Jun 2, 2025

This PR contains the following updates:

Package Change Age Adoption Passing Confidence
next (source) 14.2.18 -> 14.2.32 age adoption passing confidence

GitHub Vulnerability Alerts

CVE-2024-56332

Impact

A Denial of Service (DoS) attack allows attackers to construct requests that leaves requests to Server Actions hanging until the hosting provider cancels the function execution.

Note: Next.js server is idle during that time and only keeps the connection open. CPU and memory footprint are low during that time.

Deployments without any protection against long running Server Action invocations are especially vulnerable. Hosting providers like Vercel or Netlify set a default maximum duration on function execution to reduce the risk of excessive billing.

This is the same issue as if the incoming HTTP request has an invalid Content-Length header or never closes. If the host has no other mitigations to those then this vulnerability is novel.

This vulnerability affects only Next.js deployments using Server Actions.

Patches

This vulnerability was resolved in Next.js 14.2.21, 15.1.2, and 13.5.8. We recommend that users upgrade to a safe version.

Workarounds

There are no official workarounds for this vulnerability.

Credits

Thanks to the PackDraw team for responsibly disclosing this vulnerability.

CVE-2025-29927

Impact

It is possible to bypass authorization checks within a Next.js application, if the authorization check occurs in middleware.

Patches

  • For Next.js 15.x, this issue is fixed in 15.2.3
  • For Next.js 14.x, this issue is fixed in 14.2.25
  • For Next.js 13.x, this issue is fixed in 13.5.9
  • For Next.js 12.x, this issue is fixed in 12.3.5
  • For Next.js 11.x, consult the below workaround.

Note: Next.js deployments hosted on Vercel are automatically protected against this vulnerability.

Workaround

If patching to a safe version is infeasible, we recommend that you prevent external user requests which contain the x-middleware-subrequest header from reaching your Next.js application.

Credits

  • Allam Rachid (zhero;)
  • Allam Yasser (inzo_)

CVE-2025-48068

Summary

A low-severity vulnerability in Next.js has been fixed in version 15.2.2. This issue may have allowed limited source code exposure when the dev server was running with the App Router enabled. The vulnerability only affects local development environments and requires the user to visit a malicious webpage while npm run dev is active.

Because the mitigation is potentially a breaking change for some development setups, to opt-in to the fix, you must configure allowedDevOrigins in your next config after upgrading to a patched version. Learn more.

Learn more: https://vercel.com/changelog/cve-2025-48068

Credit

Thanks to sapphi-red and Radman Siddiki for responsibly disclosing this issue.

CVE-2025-57752

A vulnerability in Next.js Image Optimization has been fixed in v15.4.5 and v14.2.31. When images returned from API routes vary based on request headers (such as Cookie or Authorization), these responses could be incorrectly cached and served to unauthorized users due to a cache key confusion bug.

All users are encouraged to upgrade if they use API routes to serve images that depend on request headers and have image optimization enabled.

More details at Vercel Changelog

CVE-2025-55173

A vulnerability in Next.js Image Optimization has been fixed in v15.4.5 and v14.2.31. The issue allowed attacker-controlled external image sources to trigger file downloads with arbitrary content and filenames under specific configurations. This behavior could be abused for phishing or malicious file delivery.

All users relying on images.domains or images.remotePatterns are encouraged to upgrade and verify that external image sources are strictly validated.

More details at Vercel Changelog

CVE-2025-57822

A vulnerability in Next.js Middleware has been fixed in v14.2.32 and v15.4.7. The issue occurred when request headers were directly passed into NextResponse.next(). In self-hosted applications, this could allow Server-Side Request Forgery (SSRF) if certain sensitive headers from the incoming request were reflected back into the response.

All users implementing custom middleware logic in self-hosted environments are strongly encouraged to upgrade and verify correct usage of the next() function.

More details at Vercel Changelog

CVE-2025-32421

Summary
We received a responsible disclosure from Allam Rachid (zhero) for a low-severity race-condition vulnerability in Next.js. This issue only affects the Pages Router under certain misconfigurations, causing normal endpoints to serve pageProps data instead of standard HTML.

Learn more here

Credit
Thank you to Allam Rachid (zhero) for the responsible disclosure. This research was rewarded as part of our bug bounty program.


Release Notes

vercel/next.js (next)

v14.2.32

Compare Source

v14.2.31

Compare Source

[!NOTE]
This release is backporting bug fixes. It does not include all pending features/changes on canary.

Core Changes
  • fix(next/image): improve and simplify detect-content-type (#​82179)
  • fix(next/image): fix image-optimizer.ts headers (#​82178)
Credits

Huge thanks to @​styfle and @​ztanner for helping!

v14.2.30

Compare Source

v14.2.29

Compare Source

v14.2.28

Compare Source

[!NOTE]
This release is backporting bug fixes. It does not include all pending features/changes on canary.

Core Changes
  • fix: node.js module import error when using middleware (#​77945)
Credits

Huge thanks to @​ztanner for helping!

v14.2.27

Compare Source

[!NOTE]
This release is backporting bug fixes. It does not include all pending features/changes on canary.

Core Changes
  • fix dynamic route interception not working when deployed with middleware (#​64923)
Credits

Huge thanks to @​ztanner for helping!

v14.2.26

Compare Source

[!NOTE]
This release is backporting bug fixes. It does not include all pending features/changes on canary.

Core Changes
  • Match subrequest handling for edge and node (#​77476)

v14.2.25

Compare Source

[!NOTE]
This release is backporting bug fixes. It does not include all pending features/changes on canary.
This release contains a security patch for CVE-2025-29927.

Core Changes
  • Update middleware request header (#​77202)
Credits

Huge thanks to @​ijjk for helping!

v14.2.24

Compare Source

[!NOTE]
This release is backporting bug fixes. It does not include all pending features/changes on canary.

Core Changes
Credits

Huge thanks to @​ztanner for helping!

v14.2.23

Compare Source

[!NOTE]
This release is backporting bug fixes. It does not include all pending features/changes on canary.

Core Changes
  • backport: force module format for virtual client-proxy (#​74590)
  • Backport: Use provided waitUntil for pending revalidates (#​74573)
  • Feature: next/image: add support for images.qualities in next.config (#​74500)
Credits

Huge thanks to @​styfle, @​ijjk and @​lubieowoce for helping!

v14.2.22

Compare Source

[!NOTE]
This release is backporting bug fixes. It does not include all pending features/changes on canary.

Core Changes
  • Retry manifest file loading only in dev mode: #​73900
  • Ensure workers are cleaned up: #​71564
  • Use shared worker for lint & typecheck steps: #​74154
Credits

Huge thanks to @​unstubbable, @​ijjk, and @​ztanner for helping!

v14.2.21

Compare Source

[!NOTE]
This release is backporting bug fixes. It does not include all pending features/changes on canary.

Core Changes
Misc Changes
  • chore(docs): add missing search: '' on remotePatterns: #​73927
  • chore(docs): update version history of next/image: #​73926
Credits

Huge thanks to @​unstubbable, @​ztanner, and @​styfle for helping!

v14.2.20

Compare Source

[!NOTE]
This release is backporting bug fixes. It does not include all pending features/changes on canary.

Core Changes
Credits

Huge thanks to @​wyattjoh for helping!

v14.2.19

Compare Source

[!NOTE]
This release is backporting bug fixes. It does not include all pending features/changes on canary.

Core Changes
  • ensure worker exits bubble to parent process (#​73433)
  • Increase max cache tags to 128 (#​73125)
Misc Changes
  • Update max tag items limit in docs (#​73445)
Credits

Huge thanks to @​ztanner and @​ijjk for helping!


Configuration

📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

@github-actions github-actions bot temporarily deployed to nextjs-app-v14-pr-293 June 2, 2025 14:22 Inactive
@renovate renovate bot force-pushed the renovate/npm-next-vulnerability branch from 90c5524 to 5cff1c8 Compare June 6, 2025 13:25
@github-actions github-actions bot temporarily deployed to nextjs-app-v14-pr-293 June 6, 2025 13:27 Inactive
@renovate renovate bot force-pushed the renovate/npm-next-vulnerability branch from 5cff1c8 to 398798f Compare June 13, 2025 15:54
@renovate renovate bot changed the title chore(deps): dsw-000 update dependency next to v15 [security] chore(deps): dsw-000 update dependency next to v14.2.25 [security] Jun 13, 2025
@github-actions github-actions bot temporarily deployed to nextjs-app-v14-pr-293 June 13, 2025 15:55 Inactive
@renovate renovate bot force-pushed the renovate/npm-next-vulnerability branch from 398798f to 7267706 Compare June 15, 2025 04:41
@renovate renovate bot changed the title chore(deps): dsw-000 update dependency next to v14.2.25 [security] chore(deps): dsw-000 update dependency next to v14.2.30 [security] Jun 15, 2025
@github-actions github-actions bot temporarily deployed to nextjs-app-v14-pr-293 June 15, 2025 04:43 Inactive
@renovate renovate bot force-pushed the renovate/npm-next-vulnerability branch from 7267706 to e9a0c56 Compare July 23, 2025 12:09
@github-actions github-actions bot temporarily deployed to nextjs-app-v14-pr-293 July 23, 2025 12:11 Inactive
@renovate renovate bot force-pushed the renovate/npm-next-vulnerability branch from e9a0c56 to ed183b3 Compare August 13, 2025 14:09
@github-actions github-actions bot temporarily deployed to nextjs-app-v14-pr-293 August 13, 2025 14:11 Inactive
@renovate renovate bot force-pushed the renovate/npm-next-vulnerability branch from ed183b3 to f5dd535 Compare August 15, 2025 07:55
@github-actions github-actions bot temporarily deployed to nextjs-app-v14-pr-293 August 15, 2025 07:57 Inactive
@renovate renovate bot force-pushed the renovate/npm-next-vulnerability branch from f5dd535 to 1737504 Compare August 21, 2025 10:55
@github-actions github-actions bot temporarily deployed to nextjs-app-v14-pr-293 August 21, 2025 10:57 Inactive
@renovate renovate bot force-pushed the renovate/npm-next-vulnerability branch from 1737504 to f5321d2 Compare August 26, 2025 14:52
@github-actions github-actions bot temporarily deployed to nextjs-app-v14-pr-293 August 26, 2025 14:54 Inactive
@renovate renovate bot force-pushed the renovate/npm-next-vulnerability branch from f5321d2 to 06a2eea Compare August 31, 2025 23:21
@renovate renovate bot changed the title chore(deps): dsw-000 update dependency next to v14.2.30 [security] chore(deps): dsw-000 update dependency next to v14.2.32 [security] Aug 31, 2025
@github-actions github-actions bot temporarily deployed to nextjs-app-v14-pr-293 August 31, 2025 23:23 Inactive
@renovate renovate bot force-pushed the renovate/npm-next-vulnerability branch from 06a2eea to aeec28b Compare September 11, 2025 20:07
@renovate renovate bot changed the title chore(deps): dsw-000 update dependency next to v14.2.32 [security] chore(deps): dsw-000 update dependency next to v14.2.31 [security] Sep 11, 2025
@github-actions github-actions bot temporarily deployed to nextjs-app-v14-pr-293 September 11, 2025 20:09 Inactive
@renovate renovate bot force-pushed the renovate/npm-next-vulnerability branch from aeec28b to 6b6e499 Compare September 12, 2025 16:52
@renovate renovate bot changed the title chore(deps): dsw-000 update dependency next to v14.2.31 [security] chore(deps): dsw-000 update dependency next to v14.2.32 [security] Sep 12, 2025
@github-actions github-actions bot temporarily deployed to nextjs-app-v14-pr-293 September 12, 2025 16:54 Inactive
@renovate renovate bot force-pushed the renovate/npm-next-vulnerability branch from 6b6e499 to 22cb719 Compare September 24, 2025 08:08
@github-actions github-actions bot temporarily deployed to nextjs-app-v14-pr-293 September 24, 2025 08:10 Inactive
@renovate renovate bot force-pushed the renovate/npm-next-vulnerability branch 2 times, most recently from de04603 to a249dce Compare September 26, 2025 10:53
@github-actions github-actions bot temporarily deployed to nextjs-app-v14-pr-293 September 26, 2025 10:55 Inactive
@renovate renovate bot force-pushed the renovate/npm-next-vulnerability branch from a249dce to 65a5780 Compare September 29, 2025 11:37
@github-actions github-actions bot temporarily deployed to nextjs-app-v14-pr-293 September 29, 2025 11:39 Inactive
@renovate renovate bot force-pushed the renovate/npm-next-vulnerability branch from 65a5780 to ed2115a Compare September 29, 2025 13:47
@github-actions github-actions bot temporarily deployed to nextjs-app-v14-pr-293 September 29, 2025 13:50 Inactive
@renovate renovate bot force-pushed the renovate/npm-next-vulnerability branch from ed2115a to bbbf66a Compare September 29, 2025 16:23
@github-actions github-actions bot temporarily deployed to nextjs-app-v14-pr-293 September 29, 2025 16:26 Inactive
@renovate renovate bot force-pushed the renovate/npm-next-vulnerability branch from bbbf66a to 0dadcfb Compare September 30, 2025 14:49
@github-actions github-actions bot temporarily deployed to nextjs-app-v14-pr-293 September 30, 2025 14:52 Inactive
@renovate renovate bot force-pushed the renovate/npm-next-vulnerability branch from 0dadcfb to aa67c2d Compare October 1, 2025 14:51
@github-actions github-actions bot temporarily deployed to nextjs-app-v14-pr-293 October 1, 2025 14:54 Inactive
@renovate renovate bot force-pushed the renovate/npm-next-vulnerability branch from aa67c2d to e927d78 Compare October 3, 2025 10:18
@github-actions github-actions bot temporarily deployed to nextjs-app-v14-pr-293 October 3, 2025 10:21 Inactive
@renovate renovate bot force-pushed the renovate/npm-next-vulnerability branch from e927d78 to 7140b99 Compare October 3, 2025 10:45
@github-actions github-actions bot temporarily deployed to nextjs-app-v14-pr-293 October 3, 2025 10:48 Inactive
@renovate renovate bot force-pushed the renovate/npm-next-vulnerability branch from 7140b99 to 315117a Compare October 6, 2025 10:03
@github-actions github-actions bot temporarily deployed to nextjs-app-v14-pr-293 October 6, 2025 10:05 Inactive
@renovate renovate bot force-pushed the renovate/npm-next-vulnerability branch from 315117a to 3aca522 Compare October 6, 2025 16:34
@github-actions github-actions bot temporarily deployed to nextjs-app-v14-pr-293 October 6, 2025 16:37 Inactive
@renovate renovate bot force-pushed the renovate/npm-next-vulnerability branch from 3aca522 to b9246b1 Compare October 7, 2025 16:09
@renovate renovate bot force-pushed the renovate/npm-next-vulnerability branch from b9246b1 to d0649c0 Compare October 9, 2025 10:51
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

0 participants