-
Notifications
You must be signed in to change notification settings - Fork 497
chore(deps): update react and next (CVE-2025-55182) #6528
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: bottarocarlo/advisory-improvement-6528
Are you sure you want to change the base?
chore(deps): update react and next (CVE-2025-55182) #6528
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Pull request overview
This PR enhances the GitHub Security Advisory (GHSA-fv66-9v8q-g76r) for CVE-2025-55182 by adding version range information for the next and react npm packages. The advisory tracks a critical RCE vulnerability in React Server Components that affects multiple React packages and Next.js framework versions.
Key Changes:
- Added 7 version range entries for the
nextpackage covering canary and stable releases from 14.3.0-canary.77 through 16.0.7 - Added 3 version range entries for the
reactpackage (19.0.0, 19.1.0, and 19.2.0 series) with corresponding fixes
💡 Add Copilot custom instructions for smarter, more guided reviews. Learn how to get started.
advisories/github-reviewed/2025/12/GHSA-fv66-9v8q-g76r/GHSA-fv66-9v8q-g76r.json
Outdated
Show resolved
Hide resolved
advisories/github-reviewed/2025/12/GHSA-fv66-9v8q-g76r/GHSA-fv66-9v8q-g76r.json
Outdated
Show resolved
Hide resolved
advisories/github-reviewed/2025/12/GHSA-fv66-9v8q-g76r/GHSA-fv66-9v8q-g76r.json
Show resolved
Hide resolved
advisories/github-reviewed/2025/12/GHSA-fv66-9v8q-g76r/GHSA-fv66-9v8q-g76r.json
Show resolved
Hide resolved
advisories/github-reviewed/2025/12/GHSA-fv66-9v8q-g76r/GHSA-fv66-9v8q-g76r.json
Show resolved
Hide resolved
advisories/github-reviewed/2025/12/GHSA-fv66-9v8q-g76r/GHSA-fv66-9v8q-g76r.json
Outdated
Show resolved
Hide resolved
|
@bottarocarlo perhaps the existing GHSA for Next should be updated to include the CVE alias - advisories/github-reviewed/2025/12/GHSA-9qr9-h5gf-34mp/GHSA-9qr9-h5gf-34mp.json? |
|
@Serubin this was my initial though #6524 but as per comment #6496 (comment) the cveid cannot be added there |
|
@bottarocarlo makes sense. You may need to clean up the style issues from Copilot before this gets merged. I would also recommend removing/rejecting the old GHSA as a part of this PR or an immediate follow-up. |
|
@bottarocarlo I have a question about the scanning tool you're using and other advisories about CVE-2025-55182, such as GHSA-fmh4-wr37-44fp. The global advisory for GHSA-fmh4-wr37-44fp doesn't have CVE-2025-55182 attached because CVE-2025-55182 is already attached to GHSA-fv66-9v8q-g76r, but the repository advisory for GHSA-fmh4-wr37-44fp lists CVE-2025-55182 as the CVE ID. Would your tool pick up the information from GHSA-9qr9-h5gf-34mp if the repository advisory listed CVE-2025-55182 as the CVE ID? |
|
@shelbyc, the issue is that GHSA-9qr9-h5gf-34mp doesn't have the correct CVE attached. Scanners may pick up GHSA-9qr9-h5gf-34mp and alert on it, but we cannot determine the canonical ID (CVE) associated with GHSA-9qr9-h5gf-34mp. Either the |
Co-authored-by: Copilot <175728472+Copilot@users.noreply.github.com>
|
@bottarocarlo @Serubin our team reviewed CVE-2025-55182 and discussed what we could do to maximize alert reach. The short answer is that we can't add CVE-2025-55182 to more than one global advisory, and adding more products to GHSA-fv66-9v8q-g76r will result in duplicate alerts for end users. We do not want to degrade the quality of data in the ADB to accommodate limitations of other vendors' scanners. What we can do is add more information to description and references of the advisory to make the connection clearer. For GHSA-fv66-9v8q-g76r/CVE-2025-55182/React:
|
|
So just to be clear as CVE-2025-55812 not being linked to package ranges causes downstream more issues than duplicates. Certainly in my use cases. I think you need to merge and withdraw one of the issues to get to a better state I have raised yet another pr trying to resolve this here #6553 I have seen many attempts by people trying to get the data and this alias linked correctly. The data is far more important for downstream processing than the text. As a human or maybe with AI I can work out the linkage. But this should be solvable with data. Given NVD withdrew the incorrect next CVE. Following their lead would seem to be the approach that would align with what the industry is working on and possibly a good approach. So merge as per my pr ttps://github.com//pull/6553 and then withdraw GHSA-9qr9-h5gf-34mp by setting the withdrawn field. That way you end up with one mapping ranges correct and unique match. Again just some context I can provide. The NVD is basis for Fedramp procedures and process and not having the aliases correct and linked to package ranges breaks the procedures and processes supporting FedRamp. While adding comments is easy the real world impact on people and processes and manual effort increases dramatically when the data is incorrect especially the bigger the company tha leverage the data. From osv spec https://ossf.github.io/osv-schema/ withdrawn field { The withdrawn field gives the time the entry should be considered to have been withdrawn, as an RFC3339-formatted timestamp in UTC (ending in “Z”). If the field is missing, then the entry has not been withdrawn. Any rationale for why the vulnerability has been withdrawn should go into the summary text. The withdrawal reason would be clearer for GHSA-9qr9-h5gf-34mp is the old alias of withdrawn CVE had been kept. Anyone downstream should be handling withdrawn correctly. In context the number of attempts so far to resolve this issue shows as is this is clearly causing issues and why the suggestion sadly from @shelbyc is really will remain unacceptable for such a critical CVE.
|

This pull request updates the advisory data for
GHSA-fv66-9v8q-g76r.jsonby adding version range information for the affectednextandreactnpm packages. These additions clarify which versions are impacted and when fixes were introduced, improving the accuracy of vulnerability tracking for downstream consumers.