logo

Security Advisory: CVE-2025-66478 (Next.js Remote Code Execution Vulnerability)

2025-12-05

Source: https://nextjs.org/blog/CVE-2025-66478#required-action

Overview

A critical vulnerability has been identified in the React Server Components (RSC) protocol. Rated CVSS 10.0, this vulnerability may allow remote code execution when attacker-controlled requests are processed in unpatched environments.

This issue originates from the upstream React implementation (CVE-2025-55182). This advisory (CVE-2025-66478) tracks the downstream impact on Next.js applications using the App Router.

Impact

The vulnerable RSC protocol allowed untrusted inputs to influence server-side execution behavior. Under specific conditions, an attacker could craft requests that trigger unintended execution paths, potentially resulting in remote code execution.

Affected Next.js Versions

  • Next.js 15.x\
  • Next.js 16.x\
  • Next.js 14.3.0-canary.77 and later canary releases

Not Affected

  • Next.js 13.x\
  • Next.js 14.x stable\
  • Pages Router\
  • Edge Runtime

Fixed Versions

The vulnerability is fully resolved in the following releases:

  • 15.0.5\
  • 15.1.9\
  • 15.2.6\
  • 15.3.6\
  • 15.4.8\
  • 15.5.7\
  • 15.6.0-canary.58\
  • 16.0.7

Required Action

Upgrade to the latest patched version:

npm install next@15.0.5
npm install next@15.1.9
npm install next@15.2.6
npm install next@15.3.6
npm install next@15.4.8
npm install next@15.5.7
npm install next@16.0.7

If you are on a canary release:

npm install next@14

If you need canary to continue using PPR:

npm install next@15.6.0-canary.58

Discovery

Special thanks to Lachlan Davidson for discovering and responsibly disclosing this vulnerability.