We actively maintain and provide security updates for the following versions:
| Version | Supported |
|---|---|
| 1.0.x | ✅ |
Date: December 2025
Severity: Critical
Status: ✅ Patched
A critical-severity vulnerability in React Server Components (CVE-2025-55182) affects React 19 and frameworks that use it, including Next.js (CVE-2025-66478). Under certain conditions, specially crafted requests could lead to unintended remote code execution.
Reference: Vercel Security Advisory
- React: 19.0.0, 19.1.0, 19.1.1, 19.2.0
- Next.js: ≥14.3.0-canary.77, ≥15.0.0, ≥16.0.0 (before 16.0.7)
Fixed in:
- React: 19.0.1, 19.1.2, 19.2.1 ✅
- Next.js: 15.0.5, 15.1.9, 15.2.6, 15.3.6, 15.4.8, 15.5.7, 15.6.0-canary.58, 16.0.7 ✅
Action Taken:
- ✅ Updated
frontend/package.json: React 19.2.0 → 19.2.1 - ✅ Updated
frontend/package.json: Next.js 16.0.3 → 16.0.7 - ✅ Updated
reference/x402-starter-kit/package.json: React 19.2.0 → 19.2.1, Next.js 16.0.1 → 16.0.7 - ✅ Updated
eslint-config-nextto match Next.js version
Immediate Action Required:
- Update dependencies:
npm installornpm ciin thefrontend/directory - Rebuild Docker images:
make up-buildordocker-compose build frontend - Verify versions:
npm list react react-dom nextshould show patched versions
Applications using affected versions may process untrusted input in a way that allows an attacker to perform remote code execution. The vulnerability affects React Server Components implementations in:
react-server-dom-parcelreact-server-dom-webpackreact-server-dom-turbopack
- Do not rely solely on WAF/CDN protection; upgrade to patched versions
- Review and audit any custom React Server Components implementations
- Monitor for additional security advisories from React and Next.js teams
If you discover a security vulnerability, please DO NOT open a public issue. Instead, please report it via one of the following methods:
- Email: Send details to [[email protected]] (replace with actual security contact)
- GitHub Security Advisory: Use GitHub's private vulnerability reporting feature
- Direct Contact: Contact the maintainers directly
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if available)
- Your contact information
- Initial Response: Within 48 hours
- Status Update: Within 7 days
- Resolution: Depends on severity and complexity
- Keep Dependencies Updated: Regularly update all dependencies to latest patched versions
- Use Dependency Scanning: Run
npm auditandnpm audit fixregularly - Review Security Advisories: Monitor security feeds for React, Next.js, and other dependencies
- Follow Principle of Least Privilege: Limit access and permissions where possible
- Input Validation: Always validate and sanitize user inputs
- Secure Configuration: Never commit secrets, API keys, or private keys to version control
- Regular Security Audits: Conduct periodic security reviews and penetration testing
We use automated dependency scanning in CI/CD:
# Frontend
cd frontend && npm audit
# Backend
pip-audit # or safety checkRegularly check for security updates:
# Check for outdated packages
npm outdated
# Check for known vulnerabilities
npm audit
# Update dependencies
npm updateLast Updated: December 2025
Maintained By: HyperAgent Security Team