NextJS 安全漏洞
NextJS Security Vulnerability

原始链接: https://nextjs.org/blog/CVE-2025-66478

Next.js 的 React 服务器组件 (RSC) 协议存在一个关键的远程代码执行 (RCE) 漏洞 (CVE-2025-66478,源自 CVE-2025-55182)。该漏洞 CVSS 评分为 10.0,攻击者可以通过操纵未修补应用程序的请求在服务器上执行代码。 **受影响版本:** Next.js 15.x 和 16.x,以及使用 App Router 的 Next.js 14.3.0-canary.77 及更高版本 canary 发布版。**不受影响:** Next.js 13.x、14.x 稳定版、Pages Router 应用程序和 Edge Runtime。 **解决方案:** 升级到您发布系列中的最新修补的 Next.js 版本 (15.0.5, 15.1.9, 15.2.6, 15.3.6, 15.4.8, 15.5.7 或 16.0.7)。如果使用 canary 发布版,请还原到最新的 14.x 稳定版。没有替代方案;升级至关重要。 详情有意限制,以防止在修补之前被利用。感谢 Lachlan Davidson 的负责任披露。

Hacker News 新闻 | 过去 | 评论 | 提问 | 展示 | 招聘 | 提交 登录 NextJS 安全漏洞 (nextjs.org) 13 分,由 connor11528 发布 48 分钟前 | 隐藏 | 过去 | 收藏 | 1 条评论 normie3000 8 分钟前 [–] 这看起来与 React RCE (https://news.ycombinator.com/item?id=46136026) 相同,但很可能一直是 NextJS 的错。回复 指南 | 常见问题 | 列表 | API | 安全 | 法律 | 申请 YC | 联系 搜索:
相关文章

原文

A critical vulnerability has been identified in the React Server Components (RSC) protocol. The issue is rated CVSS 10.0 and can allow remote code execution when processing attacker-controlled requests in unpatched environments.

This vulnerability originates in the upstream React implementation (CVE-2025-55182). This advisory (CVE-2025-66478) tracks the downstream impact on Next.js applications using the App Router.

The vulnerable RSC protocol allowed untrusted inputs to influence server-side execution behavior. Under specific conditions, an attacker could craft requests that trigger unintended server execution paths. This can result in remote code execution in unpatched environments.

Applications using React Server Components with the App Router are affected when running:

  • Next.js 15.x
  • Next.js 16.x
  • Next.js 14.3.0-canary.77 and later canary releases

Next.js 13.x, Next.js 14.x stable, Pages Router applications, and the Edge Runtime are not affected.

The vulnerability is fully resolved in the following patched Next.js releases:

  • 15.0.5
  • 15.1.9
  • 15.2.6
  • 15.3.6
  • 15.4.8
  • 15.5.7
  • 16.0.7

These versions include the hardened React Server Components implementation.

All users should upgrade to the latest patched version in their release line:

npm install [email protected]   # for 15.0.x
npm install [email protected]   # for 15.1.x
npm install [email protected]   # for 15.2.x
npm install [email protected]   # for 15.3.x
npm install [email protected]   # for 15.4.x
npm install [email protected]   # for 15.5.x
npm install [email protected]   # for 16.0.x

If you are on Next.js 14.3.0-canary.77 or a later canary release, downgrade to the latest stable 14.x release:

There is no configuration option to disable the vulnerable code path.

Thank you to Lachlan Davidson for discovering and responsibly disclosing this vulnerability. We are intentionally limiting technical detail in this advisory to protect developers who have not yet upgraded.

联系我们 contact @ memedata.com