Remove vulnerable Next lock entry#698
Open
Finesssee wants to merge 2 commits into
Open
Conversation
Force Next's optional peer resolution to patched 15.5.16. This removes next@15.4.4 and its Next-only dependency closure from bun.lock. Co-authored-by: Copilot <223556219+Copilot@users.noreply.github.com>
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
Summary
Fixes the stale vulnerable Next.js lockfile exposure for CVE-2026-44578 by forcing Bun's optional peer resolution for
nextto the patched 15.5.16 line.package.jsondoes not directly depend on Next.js. The vulnerablenext@15.4.4entry inbun.lockwas pulled in byreact-scan's optionalnext >=13.0.0peer metadata. Regenerating the lockfile without an override kept the vulnerable optional peer, so this adds an explicit Bun override instead of adding Next as an application dependency.CVE context
CVE-2026-44578 affects the Next.js WebSocket Upgrade handling path and can expose SSRF risk in vulnerable Next.js versions. The affected ranges include:
The patched targets are 15.5.16 or 16.2.5. This repo was locking
next@15.4.4, which is in the affected 15.x range.Fix
overrides.nextpin to15.5.16.bun.lockwith the repo-declared Bun 1.3.2.next@15.4.4package entry and its Next-only dependency closure from the lockfile.After this change, no installed vulnerable Next.js package remains;
react-scanstill recordsnextas an optional peer only.Validation
bunx bun@1.3.2 install --frozen-lockfilesimple-git-hooksprepare script printed a worktree-local.git/hooksENOTDIR warning because this checkout uses a Git worktree.gitfile, but Bun exited 0 and accepted the frozen lockfile.rg -n 'next@15\.4\.4|@next/(env|swc)|"next": \["next@' package.json bun.lockfind node_modules -path '*/next/package.json' -print -quitbunx bun@1.3.2 typecheckbunx bun@1.3.2 check:frontendreorderable-item-strip.tsx,ai-settings.tsx,web-viewer-url.ts, andai-provider-interface.ts.