|
6228 | 6228 | ] |
6229 | 6229 | }, |
6230 | 6230 | { |
6231 | | - "below": "0.21.3", |
| 6231 | + "below": "0.21.2", |
6232 | 6232 | "severity": "high", |
6233 | 6233 | "cwe": [ |
6234 | 6234 | "CWE-1333", |
|
7378 | 7378 | "https://vercel.com/changelog/cve-2025-30218-5DREmEH765PoeAsrNNQj3O" |
7379 | 7379 | ] |
7380 | 7380 | }, |
| 7381 | + { |
| 7382 | + "atOrAbove": "13.0", |
| 7383 | + "below": "14.2.30", |
| 7384 | + "cwe": [ |
| 7385 | + "CWE-1385" |
| 7386 | + ], |
| 7387 | + "severity": "low", |
| 7388 | + "identifiers": { |
| 7389 | + "summary": "Information exposure in Next.js dev server due to lack of origin verification", |
| 7390 | + "CVE": [ |
| 7391 | + "CVE-2025-48068" |
| 7392 | + ], |
| 7393 | + "githubID": "GHSA-3h52-269p-cp9r" |
| 7394 | + }, |
| 7395 | + "info": [ |
| 7396 | + "https://github.com/advisories/GHSA-3h52-269p-cp9r", |
| 7397 | + "https://github.com/vercel/next.js/security/advisories/GHSA-3h52-269p-cp9r", |
| 7398 | + "https://nvd.nist.gov/vuln/detail/CVE-2025-48068", |
| 7399 | + "https://github.com/vercel/next.js", |
| 7400 | + "https://vercel.com/changelog/cve-2025-48068" |
| 7401 | + ] |
| 7402 | + }, |
7381 | 7403 | { |
7382 | 7404 | "atOrAbove": "15.0.0", |
7383 | 7405 | "below": "15.1.2", |
|
7422 | 7444 | ] |
7423 | 7445 | }, |
7424 | 7446 | { |
7425 | | - "atOrAbove": "13.0", |
| 7447 | + "atOrAbove": "15.0.4-canary.51", |
| 7448 | + "below": "15.1.8", |
| 7449 | + "cwe": [ |
| 7450 | + "CWE-444" |
| 7451 | + ], |
| 7452 | + "severity": "high", |
| 7453 | + "identifiers": { |
| 7454 | + "summary": "### Summary\nA vulnerability affecting Next.js has been addressed. It impacted versions 15.0.4 through 15.1.8 and involved a cache poisoning bug leading to a Denial of Service (DoS) condition.\n\nUnder certain conditions, this issue may allow a HTTP 204 response to be cached for static pages, leading to the 204 response being served to all users attempting to access the page\n\nMore details: [CVE-2025-49826](https://vercel.com/changelog/cve-2025-49826)\n\n## Credits\n- Allam Rachid [zhero;](https://zhero-web-sec.github.io/research-and-things/)\n- Allam Yasser (inzo)", |
| 7455 | + "githubID": "GHSA-67rr-84xm-4c7r", |
| 7456 | + "CVE": [ |
| 7457 | + "CVE-2025-49826" |
| 7458 | + ] |
| 7459 | + }, |
| 7460 | + "info": [ |
| 7461 | + "https://github.com/vercel/next.js/security/advisories/GHSA-67rr-84xm-4c7r", |
| 7462 | + "https://github.com/vercel/next.js/commit/16bfce64ef2157f2c1dfedcfdb7771bc63103fd2", |
| 7463 | + "https://github.com/vercel/next.js/commit/a15b974ed707d63ad4da5b74c1441f5b7b120e93", |
| 7464 | + "https://github.com/vercel/next.js/releases/tag/v15.1.8", |
| 7465 | + "https://vercel.com/changelog/cve-2025-49826" |
| 7466 | + ] |
| 7467 | + }, |
| 7468 | + { |
| 7469 | + "atOrAbove": "15.0.0", |
7426 | 7470 | "below": "15.2.2", |
7427 | 7471 | "cwe": [ |
7428 | 7472 | "CWE-1385" |
|
7493 | 7537 | "https://github.com/vercel/next.js", |
7494 | 7538 | "https://vercel.com/changelog/cve-2025-30218-5DREmEH765PoeAsrNNQj3O" |
7495 | 7539 | ] |
| 7540 | + }, |
| 7541 | + { |
| 7542 | + "atOrAbove": "15.3.0", |
| 7543 | + "below": "15.3.3", |
| 7544 | + "cwe": [ |
| 7545 | + "CWE-444" |
| 7546 | + ], |
| 7547 | + "severity": "low", |
| 7548 | + "identifiers": { |
| 7549 | + "summary": "### Summary\n\nA cache poisoning issue in **Next.js App Router >=15.3.0 and < 15.3.3** may have allowed RSC payloads to be cached and served in place of HTML, under specific conditions involving middleware and redirects. This issue has been fixed in **Next.js 15.3.3**.\n\nUsers on affected versions should **upgrade immediately** and **redeploy** to ensure proper caching behavior.\n\nMore details: [CVE-2025-49005](https://vercel.com/changelog/cve-2025-49005)", |
| 7550 | + "githubID": "GHSA-r2fc-ccr8-96c4", |
| 7551 | + "CVE": [ |
| 7552 | + "CVE-2025-49005" |
| 7553 | + ] |
| 7554 | + }, |
| 7555 | + "info": [ |
| 7556 | + "https://github.com/vercel/next.js/security/advisories/GHSA-r2fc-ccr8-96c4", |
| 7557 | + "https://github.com/vercel/next.js/issues/79346", |
| 7558 | + "https://github.com/vercel/next.js/pull/79939", |
| 7559 | + "https://github.com/vercel/next.js/commit/ec202eccf05820b60c6126d6411fe16766ecc066", |
| 7560 | + "https://github.com/vercel/next.js/releases/tag/v15.3.3", |
| 7561 | + "https://vercel.com/changelog/cve-2025-49005" |
| 7562 | + ] |
7496 | 7563 | } |
7497 | 7564 | ], |
7498 | 7565 | "extractors": { |
|
8111 | 8178 | "/\\*[\\s*!]+(?:@license)?[\\s*]+(?:Lo-Dash|lodash|Lodash) v?(§§version§§)[\\s\\S]{1,200}Build: `lodash modern -o", |
8112 | 8179 | "/\\*[\\s*!]+(?:@license)?[\\s*]+(?:Lo-Dash|lodash|Lodash) v?(§§version§§) <", |
8113 | 8180 | "/\\*[\\s*!]+(?:@license)?[\\s*]+(?:Lo-Dash|lodash|Lodash) v?(§§version§§) lodash.com/license", |
8114 | | - "=\"(§§version§§)\"[\\s\\S]{1,300}__lodash_hash_undefined__", |
| 8181 | + "=\"(§§version§§)(?<=[0-9]{1,2}\\.[0-9]{1,2}\\.[0-9]{1,2})\"[\\s\\S]{1,300}__lodash_hash_undefined__", |
8115 | 8182 | "/\\*[\\s*]+@license[\\s*]+(?:Lo-Dash|lodhash|Lodash)[\\s\\S]{1,500}var VERSION *= *['\"](§§version§§)['\"]", |
8116 | 8183 | "var VERSION=\"(§§version§§)\";var BIND_FLAG=1,BIND_KEY_FLAG=2,CURRY_BOUND_FLAG=4,CURRY_FLAG=8" |
8117 | 8184 | ], |
|
0 commit comments