Skip to content

Conversation

@xivanku
Copy link

@xivanku xivanku commented Jan 29, 2026

Updates

  • Affected products

Comments
According to Vercel NextJS v15.5.10, and v15.5.11 already contains a patch against these vulnerabilities
https://vercel.com/changelog/summaries-of-cve-2025-59471-and-cve-2025-59472
https://www.cve.org/CVERecord?id=CVE-2025-59472

@github
Copy link
Collaborator

github commented Jan 29, 2026

Hi there @andresriancho! A community member has suggested an improvement to your security advisory. If approved, this change will affect the global advisory listed at github.com/advisories. It will not affect the version listed in your project repository.

This change will be reviewed by our Security Curation Team. If you have thoughts or feedback, please share them in a comment here! If this PR has already been closed, you can start a new community contribution for this advisory

Copilot AI review requested due to automatic review settings January 29, 2026 09:48
Copy link

Copilot AI left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Pull request overview

This PR updates the Next.js security advisory GHSA-5f7q-jpqc-wp7h to reflect accurate version information for CVE-2025-59472, which addresses unbounded memory consumption via the PPR Resume Endpoint.

Changes:

  • Corrected the vulnerable version range to start from 15.6.0-canary.0 instead of 15.0.0-canary.0
  • Updated the fixed versions to include stable releases 15.5.10 and 15.5.11 in addition to the canary version
  • Added database-specific metadata to clarify the last known affected version range

💡 Add Copilot custom instructions for smarter, more guided reviews. Learn how to get started.

},
{
"fixed": "15.6.0-canary.61"
"fixed": "15.6.0-canary.61, 15.5.10, 15.5.11"
Copy link

Copilot AI Jan 29, 2026

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The 'fixed' field should contain a single version string, not a comma-separated list. According to standard advisory schemas, multiple fixed versions should be represented as separate event objects with their own 'fixed' fields within the events array.

Suggested change
"fixed": "15.6.0-canary.61, 15.5.10, 15.5.11"
"fixed": "15.6.0-canary.61"
},
{
"fixed": "15.5.10"
},
{
"fixed": "15.5.11"

Copilot uses AI. Check for mistakes.
"events": [
{
"introduced": "15.0.0-canary.0"
"introduced": "15.6.0-canary.0"
Copy link

Copilot AI Jan 29, 2026

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The introduced version '15.6.0-canary.0' appears inconsistent with the stable fixed versions '15.5.10' and '15.5.11'. If versions 15.5.10 and 15.5.11 contain fixes, the vulnerability must have been introduced before 15.5.10, not at 15.6.0-canary.0. This suggests the version range is incorrect.

Copilot uses AI. Check for mistakes.
@github-actions github-actions bot changed the base branch from main to xivanku/advisory-improvement-6740 January 29, 2026 09:49
@xivanku
Copy link
Author

xivanku commented Jan 29, 2026

I sent another suggestion to include the fixed versions.

@xivanku xivanku closed this Jan 29, 2026
@github-actions github-actions bot deleted the xivanku-GHSA-5f7q-jpqc-wp7h branch January 29, 2026 10:35
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

5 participants