AL
December 5, 2025
CRITICAL SECURITY ALERT: Next.js RCE Vulnerability (CVE-2025-66478)
Hope everyone is doing well, something else from my side today, since I still deal with a branch of security (forensics), I thought it would make sense to talk about this. And I know a lot of people here develop React Applications.
A critical vulnerability (CVSS 10.0) has been identified in the underlying React Server Components (RSC) protocol.
This flaw, tracked in Next.js as CVE-2025-66478, can lead to Remote Code Execution (RCE) when processing attacker-controlled requests in unpatched Next.js applications using the App Router.
Immediate Action Required
If you are running an affected version, you must update immediately. There is no configuration option to disable the vulnerable code path.
- Upgrade to a patched version: Use the following commands for the latest releases in your current line:
# Recommended Upgrades
npm install next@15.0.5 # For 15.0.x
npm install next@15.1.9 # For 15.1.x
npm install next@15.2.6 # For 15.2.x
npm install next@15.3.6 # For 15.3.x
npm install next@15.4.8 # For 15.4.x
npm install next@15.5.7 # For 15.5.x
npm install next@16.0.7 # For 16.0.x
Canary users: If you are on an affected canary release (14.3.0-canary.77+), you should downgrade to the latest stable 14.x (npm install next@14) or update to 15.6.0-canary.58 (if you require PPR support).
🔍 What You Need to Know Impact: The vulnerability allows untrusted input to influence server-side execution paths, which can result in RCE under specific conditions.
Affected (App Router only): Next.js 15.x, 16.x, and certain later 14.x canary releases.
Not Affected: Pages Router applications, stable Next.js 13.x/14.x releases, and applications using the Edge Runtime.
Please prioritize this update to secure your applications.
Full Advisory Details: https://nextjs.org/blog/CVE-2025-66478
Thanks, take care! also thanks to <#1362244018213359686> <:peepoBlanket:921862253605716029>