Which versions are affected?
The vulnerability affects Next.js applications using React Server Components with the App Router in these versions:- Next.js 15.x (all minor versions)
- Next.js 16.x (all minor versions)
- Next.js 14.3.0-canary.77 and later canary releases
What’s the risk?
The vulnerable RSC protocol allowed untrusted inputs to influence server-side execution behavior. Under specific conditions, an attacker could craft requests that trigger unintended server execution paths. This can result in remote code execution in unpatched environments. The Next.js team is intentionally limiting technical details to protect developers who haven’t upgraded yet.How to fix this now
Upgrade to the latest patched version in your release line:Update your Upsun deployments
After updating your Next.js version locally, commit the changes and push to your repository. Upsun will automatically rebuild and redeploy your application with the patched version.Test before production
Use Upsun’s preview environments to test the update before deploying to production. Create a new branch, update Next.js, and push:Verify your update
After deployment, check your running Next.js version in your Upsun environment:Credit and disclosure
Lachlan Davidson discovered and responsibly disclosed this vulnerability. The coordinated disclosure process allowed the Next.js team to develop and release patches before public announcement.Learn more
Read the full technical details in the Next.js security advisory and the upstream React CVE-2025-55182 advisory. For questions about deploying secure Next.js applications on Upsun, check our Next.js deployment guide.Deploy secure Next.js applications on Upsun with built-in preview environments and automated deployments. Create your free account to get started.