The React Framework
95%
Total Score
80
100
100
95
100
| Title | Versions | Severity |
|---|---|---|
CVE-2025-59472 next is vulnerable to Uncontrolled Resource Consumption in versions 16.0.0-beta.0 - 16.1.5, 15.0.0-canary.0 - 15.0.0, 15.0.1-canary.0 - 15.0.1, 15.0.2-canary.0 - 15.0.2, 15.0.3-canary.0 - 15.0.3, 15.0.4-canary.0 - 15.0.4, 15.1.1-canary.0 - 15.1.1, 15.2.0-canary.0 - 15.2.0, 15.2.1-canary.0 - 15.2.1, 15.2.2-canary.0 - 15.2.2, 15.3.0-canary.0 - 15.3.0, 15.3.1-canary.0 - 15.3.1, 15.4.0-canary.0 - 15.4.0, 15.4.2-canary.0 - 15.4.2, 15.5.1-canary.0 - 15.5.1 and 15.6.0-canary.0 - 15.6.0-canary.61. | 15.0.0-canary.0 - 15.0.415.1.1-canary.0 - 15.1.115.2.0-canary.0 - 15.2.2 +6 more | Medium |
AIKIDO-2026-10095 next is vulnerable to Denial of Service (DoS) in versions 16.2.0-canary.1 - 16.2.0-canary.8, 16.1.0 - 16.1.4, 16.0.0 - 16.0.10, 15.6.0-canary.1 - 15.6.0-canary.60, 15.5.0 - 15.5.9, 15.4.0 - 15.4.10, 15.3.0 - 15.3.8, 15.2.0 - 15.2.8, 15.1.0 - 15.1.0 and 13.0.0 - 15.0.7. | 13.0.0 - 15.0.715.1.0 - 15.1.015.2.0 - 15.2.8 +7 more | High |
CVE-2025-59471 next is vulnerable to Uncontrolled Resource Consumption in versions 10.0.0 - 15.5.10 and 15.6.0-canary.0 - 16.1.5. | 10.0.0 - 15.5.1015.6.0-canary.0 - 16.1.5 | Medium |
AIKIDO-2025-10937 next is vulnerable to Source Code Exposure in versions 15.0.0 - 15.0.6, 15.1.1 - 15.1.10, 15.2.0 - 15.2.7, 15.3.0 - 15.3.7, 15.4.0 - 15.4.9, 15.5.1 - 15.5.8 and 16.0.0 - 16.0.9. | 15.0.0 - 15.0.615.1.1 - 15.1.1015.2.0 - 15.2.7 +4 more | Medium |
AIKIDO-2025-10936 next is vulnerable to Denial of Service in versions 13.3.0 - 14.2.34, 15.0.0 - 15.0.6, 15.1.1 - 15.1.10, 15.2.0 - 15.2.7, 15.3.0 - 15.3.7, 15.4.0 - 15.4.9, 15.5.1 - 15.5.8 and 16.0.0 - 16.0.9. | 13.3.0 - 14.2.3415.0.0 - 15.0.615.1.1 - 15.1.10 +5 more | High |
| Dependency | Last Release | Score |
|---|---|---|
postcss Version 8.4.31 | — | — |
@next/env Version 16.1.6 | — | — |
styled-jsx Version 5.1.6 | — | — |
@swc/helpers Version 0.5.15 | — | — |
caniuse-lite Version ^1.0.30001579 | — | — |
Secure your code, cloud, and runtime environments in one central system. Find and fix vulnerabilities automatically.
No credit card required | Scan results in 32secs.
SOC 2Compliant
ISO 27001Compliant