Update introduced version in GHSA advisory (CVE-2025-55173)#6120
Merged
advisory-database[bot] merged 1 commit intogithub:medikoo/advisory-improvement-6120from Sep 11, 2025
Merged
Conversation
Fixes the issue where security vulnerability is incorrectly applied to projects that depend on the v0.4 version of `next` which is a totally different product than one started at v0.9.9. It was already discussed before, see github#179 for context This problem was already fixed for some previous vulnerabilities of `next`, but constantly gets back, when new vulnerability is introduced Note: I wasn't able to introduce this change via suggest form as it exposes just "Affected versions" field, which logically would have to be `>=0.9.9, < 14.2.31` but that value is not accepted (Looks as another bug worth reporting)
There was a problem hiding this comment.
Pull Request Overview
Updates the introduced version in a GitHub Security Advisory (GHSA-xv57-4mr9-wg8v) for CVE-2025-55173 to correctly specify that the vulnerability affects Next.js starting from version 0.9.9 rather than version 0. This prevents incorrect application of the security vulnerability to projects using the unrelated v0.4 version of next.
- Updates the "introduced" version from "0" to "0.9.9" in the security advisory JSON
- Corrects the version range to properly scope the vulnerability to the intended Next.js product line
- Aligns with previous fixes for similar version scoping issues in other Next.js vulnerabilities
Tip: Customize your code reviews with copilot-instructions.md. Create the file or learn how to get started.
aedd200
into
github:medikoo/advisory-improvement-6120
2 checks passed
Contributor
|
Hi @medikoo! Thank you so much for contributing to the GitHub Advisory Database. This database is free, open, and accessible to all, and it's people like you who make it great. Thanks for choosing to help others. We hope you send in more contributions in the future! |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
Fixes the issue where security vulnerability is incorrectly applied to projects that depend on the v0.4 version of
nextwhich is a totally different product than one started at v0.9.9.It was already discussed before, see #179 for context
This problem was already fixed for some previous vulnerabilities of
next, but constantly gets back, when new vulnerability is introducedNote: I wasn't able to introduce this change via suggest form as it exposes just "Affected versions" field, which logically would have to be
>=0.9.9, < 14.2.31but that value is not accepted (Looks as another bug worth reporting)