Replies: 2 comments 3 replies
-
|
CVE-2025-64756 doesn't appear to be a real CVE (the numbering format suggests it might be from a scanning tool that generates pseudo-CVEs or a false positive). That said, the underlying concern is valid - Next.js v14's eslint-plugin-next does pin A few points:
If you need to override it immediately: Using npm: // package.json
{
"overrides": {
"@next/eslint-plugin-next": {
"glob": "^10.4.5"
}
}
}Using pnpm: # .pnpmfile.cjs or pnpm.overrides in package.json
pnpm:
overrides:
glob: ^10.4.5For Next.js team: If this is a legitimate vulnerability report, it would be worth bumping glob to latest 10.x in the next v14 patch release. Could you share where this CVE is documented? That would help clarify whether it's a real security issue or a scanner false positive. |
Beta Was this translation helpful? Give feedback.
-
|
I've also been affected by this vulnerability, though it's not clear to me that any fix is in the pipeline. I see the issue raised by the OP has been auto-closed without action: #87126 Is there a way we can get this re-raised or re-opened? The requirement to point to a public repo where the bug can be reproduced seems like it might not be applicable in this case. Though I think that pointing to any public repo that has Next.js 14.2.35 as a dependency would cover it. |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
-
Summary
On v14 a vulnerable version (CVE-2025-64756) of
globis pinned.next.js/packages/eslint-plugin-next/package.json
Line 15 in 7b940d9
Are there any plans for an upgrade?
Additional information
No response
Example
No response
Beta Was this translation helpful? Give feedback.
All reactions