🚨 [security] Update all of nextjs 13.5.6 β†’ 16.1.6 (major)


🚨 Your current dependencies have known security vulnerabilities 🚨

This dependency update fixes known security vulnerabilities. Please see the details below and assess their impact carefully. We recommend to merge and deploy this as soon as possible!


Here is everything you need to know about this upgrade. Please take a good look at what changed and the test results before merging this pull request.

What changed?

✳️ eslint-config-next (13.5.6 β†’ 16.1.6)

Sorry, we couldn’t find anything useful about this release.

✳️ next (13.5.6 β†’ 16.1.6) Β· Repo

Security Advisories 🚨

🚨 Next.js has Unbounded Memory Consumption via PPR Resume Endpoint

A denial of service vulnerability exists in Next.js versions with Partial Prerendering (PPR) enabled when running in minimal mode. The PPR resume endpoint accepts unauthenticated POST requests with the Next-Resume: 1 header and processes attacker-controlled postponed state data. Two closely related vulnerabilities allow an attacker to crash the server process through memory exhaustion:

  1. Unbounded request body buffering: The server buffers the entire POST request body into memory using Buffer.concat() without enforcing any size limit, allowing arbitrarily large payloads to exhaust available memory.

  2. Unbounded decompression (zipbomb): The resume data cache is decompressed using inflateSync() without limiting the decompressed output size. A small compressed payload can expand to hundreds of megabytes or gigabytes, causing memory exhaustion.

Both attack vectors result in a fatal V8 out-of-memory error (FATAL ERROR: Reached heap limit Allocation failed - JavaScript heap out of memory) causing the Node.js process to terminate. The zipbomb variant is particularly dangerous as it can bypass reverse proxy request size limits while still causing large memory allocation on the server.

To be affected, an application must run with experimental.ppr: true or cacheComponents: true configured along with the NEXT_PRIVATE_MINIMAL_MODE=1 environment variable.

Strongly consider upgrading to 15.6.0-canary.61 or 16.1.5 to reduce risk and prevent availability issues in Next applications.

🚨 Next.js HTTP request deserialization can lead to DoS when using insecure React Server Components

A vulnerability affects certain React Server Components packages for versions 19.0.x, 19.1.x, and 19.2.x and frameworks that use the affected packages, including Next.js 13.x, 14.x, 15.x, and 16.x using the App Router. The issue is tracked upstream as CVE-2026-23864.

A specially crafted HTTP request can be sent to any App Router Server Function endpoint that, when deserialized, may trigger excessive CPU usage, out-of-memory exceptions, or server crashes. This can result in denial of service in unpatched environments.

🚨 Next.js HTTP request deserialization can lead to DoS when using insecure React Server Components

A vulnerability affects certain React Server Components packages for versions 19.0.x, 19.1.x, and 19.2.x and frameworks that use the affected packages, including Next.js 13.x, 14.x, 15.x, and 16.x using the App Router. The issue is tracked upstream as CVE-2026-23864.

A specially crafted HTTP request can be sent to any App Router Server Function endpoint that, when deserialized, may trigger excessive CPU usage, out-of-memory exceptions, or server crashes. This can result in denial of service in unpatched environments.

🚨 Next.js HTTP request deserialization can lead to DoS when using insecure React Server Components

A vulnerability affects certain React Server Components packages for versions 19.0.x, 19.1.x, and 19.2.x and frameworks that use the affected packages, including Next.js 13.x, 14.x, 15.x, and 16.x using the App Router. The issue is tracked upstream as CVE-2026-23864.

A specially crafted HTTP request can be sent to any App Router Server Function endpoint that, when deserialized, may trigger excessive CPU usage, out-of-memory exceptions, or server crashes. This can result in denial of service in unpatched environments.

🚨 Next.js HTTP request deserialization can lead to DoS when using insecure React Server Components

A vulnerability affects certain React Server Components packages for versions 19.0.x, 19.1.x, and 19.2.x and frameworks that use the affected packages, including Next.js 13.x, 14.x, 15.x, and 16.x using the App Router. The issue is tracked upstream as CVE-2026-23864.

A specially crafted HTTP request can be sent to any App Router Server Function endpoint that, when deserialized, may trigger excessive CPU usage, out-of-memory exceptions, or server crashes. This can result in denial of service in unpatched environments.

🚨 Next.js HTTP request deserialization can lead to DoS when using insecure React Server Components

A vulnerability affects certain React Server Components packages for versions 19.0.x, 19.1.x, and 19.2.x and frameworks that use the affected packages, including Next.js 13.x, 14.x, 15.x, and 16.x using the App Router. The issue is tracked upstream as CVE-2026-23864.

A specially crafted HTTP request can be sent to any App Router Server Function endpoint that, when deserialized, may trigger excessive CPU usage, out-of-memory exceptions, or server crashes. This can result in denial of service in unpatched environments.

🚨 Next.js HTTP request deserialization can lead to DoS when using insecure React Server Components

A vulnerability affects certain React Server Components packages for versions 19.0.x, 19.1.x, and 19.2.x and frameworks that use the affected packages, including Next.js 13.x, 14.x, 15.x, and 16.x using the App Router. The issue is tracked upstream as CVE-2026-23864.

A specially crafted HTTP request can be sent to any App Router Server Function endpoint that, when deserialized, may trigger excessive CPU usage, out-of-memory exceptions, or server crashes. This can result in denial of service in unpatched environments.

🚨 Next.js HTTP request deserialization can lead to DoS when using insecure React Server Components

A vulnerability affects certain React Server Components packages for versions 19.0.x, 19.1.x, and 19.2.x and frameworks that use the affected packages, including Next.js 13.x, 14.x, 15.x, and 16.x using the App Router. The issue is tracked upstream as CVE-2026-23864.

A specially crafted HTTP request can be sent to any App Router Server Function endpoint that, when deserialized, may trigger excessive CPU usage, out-of-memory exceptions, or server crashes. This can result in denial of service in unpatched environments.

🚨 Next.js HTTP request deserialization can lead to DoS when using insecure React Server Components

A vulnerability affects certain React Server Components packages for versions 19.0.x, 19.1.x, and 19.2.x and frameworks that use the affected packages, including Next.js 13.x, 14.x, 15.x, and 16.x using the App Router. The issue is tracked upstream as CVE-2026-23864.

A specially crafted HTTP request can be sent to any App Router Server Function endpoint that, when deserialized, may trigger excessive CPU usage, out-of-memory exceptions, or server crashes. This can result in denial of service in unpatched environments.

🚨 Next.js HTTP request deserialization can lead to DoS when using insecure React Server Components

A vulnerability affects certain React Server Components packages for versions 19.0.x, 19.1.x, and 19.2.x and frameworks that use the affected packages, including Next.js 13.x, 14.x, 15.x, and 16.x using the App Router. The issue is tracked upstream as CVE-2026-23864.

A specially crafted HTTP request can be sent to any App Router Server Function endpoint that, when deserialized, may trigger excessive CPU usage, out-of-memory exceptions, or server crashes. This can result in denial of service in unpatched environments.

🚨 Next.js has Unbounded Memory Consumption via PPR Resume Endpoint

A denial of service vulnerability exists in Next.js versions with Partial Prerendering (PPR) enabled when running in minimal mode. The PPR resume endpoint accepts unauthenticated POST requests with the Next-Resume: 1 header and processes attacker-controlled postponed state data. Two closely related vulnerabilities allow an attacker to crash the server process through memory exhaustion:

  1. Unbounded request body buffering: The server buffers the entire POST request body into memory using Buffer.concat() without enforcing any size limit, allowing arbitrarily large payloads to exhaust available memory.

  2. Unbounded decompression (zipbomb): The resume data cache is decompressed using inflateSync() without limiting the decompressed output size. A small compressed payload can expand to hundreds of megabytes or gigabytes, causing memory exhaustion.

Both attack vectors result in a fatal V8 out-of-memory error (FATAL ERROR: Reached heap limit Allocation failed - JavaScript heap out of memory) causing the Node.js process to terminate. The zipbomb variant is particularly dangerous as it can bypass reverse proxy request size limits while still causing large memory allocation on the server.

To be affected, an application must run with experimental.ppr: true or cacheComponents: true configured along with the NEXT_PRIVATE_MINIMAL_MODE=1 environment variable.

Strongly consider upgrading to 15.6.0-canary.61 or 16.1.5 to reduce risk and prevent availability issues in Next applications.

🚨 Next.js self-hosted applications vulnerable to DoS via Image Optimizer remotePatterns configuration

A DoS vulnerability exists in self-hosted Next.js applications that have remotePatterns configured for the Image Optimizer. The image optimization endpoint (/_next/image) loads external images entirely into memory without enforcing a maximum size limit, allowing an attacker to cause out-of-memory conditions by requesting optimization of arbitrarily large images. This vulnerability requires that remotePatterns is configured to allow image optimization from external domains and that the attacker can serve or control a large image on an allowed domain.

Strongly consider upgrading to 15.5.10 and 16.1.5 to reduce risk and prevent availability issues in Next applications.

🚨 Next.js self-hosted applications vulnerable to DoS via Image Optimizer remotePatterns configuration

A DoS vulnerability exists in self-hosted Next.js applications that have remotePatterns configured for the Image Optimizer. The image optimization endpoint (/_next/image) loads external images entirely into memory without enforcing a maximum size limit, allowing an attacker to cause out-of-memory conditions by requesting optimization of arbitrarily large images. This vulnerability requires that remotePatterns is configured to allow image optimization from external domains and that the attacker can serve or control a large image on an allowed domain.

Strongly consider upgrading to 15.5.10 and 16.1.5 to reduce risk and prevent availability issues in Next applications.

🚨 Next has a Denial of Service with Server Components - Incomplete Fix Follow-Up

It was discovered that the fix for CVE-2025-55184 in React Server Components was incomplete and did not fully mitigate denial-of-service conditions across all payload types. As a result, certain crafted inputs could still trigger excessive resource consumption.

This vulnerability affects React versions 19.0.2, 19.1.3, and 19.2.2, as well as frameworks that bundle or depend on these versions, including Next.js 13.x, 14.x, 15.x, and 16.x when using the App Router. The issue is tracked upstream as CVE-2025-67779.

A malicious actor can send a specially crafted HTTP request to a Server Function endpoint that, when deserialized, causes the React Server Components runtime to enter an infinite loop. This can lead to sustained CPU consumption and cause the affected server process to become unresponsive, resulting in a denial-of-service condition in unpatched environments.

🚨 Next has a Denial of Service with Server Components - Incomplete Fix Follow-Up

It was discovered that the fix for CVE-2025-55184 in React Server Components was incomplete and did not fully mitigate denial-of-service conditions across all payload types. As a result, certain crafted inputs could still trigger excessive resource consumption.

This vulnerability affects React versions 19.0.2, 19.1.3, and 19.2.2, as well as frameworks that bundle or depend on these versions, including Next.js 13.x, 14.x, 15.x, and 16.x when using the App Router. The issue is tracked upstream as CVE-2025-67779.

A malicious actor can send a specially crafted HTTP request to a Server Function endpoint that, when deserialized, causes the React Server Components runtime to enter an infinite loop. This can lead to sustained CPU consumption and cause the affected server process to become unresponsive, resulting in a denial-of-service condition in unpatched environments.

🚨 Next has a Denial of Service with Server Components - Incomplete Fix Follow-Up

It was discovered that the fix for CVE-2025-55184 in React Server Components was incomplete and did not fully mitigate denial-of-service conditions across all payload types. As a result, certain crafted inputs could still trigger excessive resource consumption.

This vulnerability affects React versions 19.0.2, 19.1.3, and 19.2.2, as well as frameworks that bundle or depend on these versions, including Next.js 13.x, 14.x, 15.x, and 16.x when using the App Router. The issue is tracked upstream as CVE-2025-67779.

A malicious actor can send a specially crafted HTTP request to a Server Function endpoint that, when deserialized, causes the React Server Components runtime to enter an infinite loop. This can lead to sustained CPU consumption and cause the affected server process to become unresponsive, resulting in a denial-of-service condition in unpatched environments.

🚨 Next has a Denial of Service with Server Components - Incomplete Fix Follow-Up

It was discovered that the fix for CVE-2025-55184 in React Server Components was incomplete and did not fully mitigate denial-of-service conditions across all payload types. As a result, certain crafted inputs could still trigger excessive resource consumption.

This vulnerability affects React versions 19.0.2, 19.1.3, and 19.2.2, as well as frameworks that bundle or depend on these versions, including Next.js 13.x, 14.x, 15.x, and 16.x when using the App Router. The issue is tracked upstream as CVE-2025-67779.

A malicious actor can send a specially crafted HTTP request to a Server Function endpoint that, when deserialized, causes the React Server Components runtime to enter an infinite loop. This can lead to sustained CPU consumption and cause the affected server process to become unresponsive, resulting in a denial-of-service condition in unpatched environments.

🚨 Next has a Denial of Service with Server Components - Incomplete Fix Follow-Up

It was discovered that the fix for CVE-2025-55184 in React Server Components was incomplete and did not fully mitigate denial-of-service conditions across all payload types. As a result, certain crafted inputs could still trigger excessive resource consumption.

This vulnerability affects React versions 19.0.2, 19.1.3, and 19.2.2, as well as frameworks that bundle or depend on these versions, including Next.js 13.x, 14.x, 15.x, and 16.x when using the App Router. The issue is tracked upstream as CVE-2025-67779.

A malicious actor can send a specially crafted HTTP request to a Server Function endpoint that, when deserialized, causes the React Server Components runtime to enter an infinite loop. This can lead to sustained CPU consumption and cause the affected server process to become unresponsive, resulting in a denial-of-service condition in unpatched environments.

🚨 Next has a Denial of Service with Server Components - Incomplete Fix Follow-Up

It was discovered that the fix for CVE-2025-55184 in React Server Components was incomplete and did not fully mitigate denial-of-service conditions across all payload types. As a result, certain crafted inputs could still trigger excessive resource consumption.

This vulnerability affects React versions 19.0.2, 19.1.3, and 19.2.2, as well as frameworks that bundle or depend on these versions, including Next.js 13.x, 14.x, 15.x, and 16.x when using the App Router. The issue is tracked upstream as CVE-2025-67779.

A malicious actor can send a specially crafted HTTP request to a Server Function endpoint that, when deserialized, causes the React Server Components runtime to enter an infinite loop. This can lead to sustained CPU consumption and cause the affected server process to become unresponsive, resulting in a denial-of-service condition in unpatched environments.

🚨 Next has a Denial of Service with Server Components - Incomplete Fix Follow-Up

It was discovered that the fix for CVE-2025-55184 in React Server Components was incomplete and did not fully mitigate denial-of-service conditions across all payload types. As a result, certain crafted inputs could still trigger excessive resource consumption.

This vulnerability affects React versions 19.0.2, 19.1.3, and 19.2.2, as well as frameworks that bundle or depend on these versions, including Next.js 13.x, 14.x, 15.x, and 16.x when using the App Router. The issue is tracked upstream as CVE-2025-67779.

A malicious actor can send a specially crafted HTTP request to a Server Function endpoint that, when deserialized, causes the React Server Components runtime to enter an infinite loop. This can lead to sustained CPU consumption and cause the affected server process to become unresponsive, resulting in a denial-of-service condition in unpatched environments.

🚨 Next has a Denial of Service with Server Components - Incomplete Fix Follow-Up

It was discovered that the fix for CVE-2025-55184 in React Server Components was incomplete and did not fully mitigate denial-of-service conditions across all payload types. As a result, certain crafted inputs could still trigger excessive resource consumption.

This vulnerability affects React versions 19.0.2, 19.1.3, and 19.2.2, as well as frameworks that bundle or depend on these versions, including Next.js 13.x, 14.x, 15.x, and 16.x when using the App Router. The issue is tracked upstream as CVE-2025-67779.

A malicious actor can send a specially crafted HTTP request to a Server Function endpoint that, when deserialized, causes the React Server Components runtime to enter an infinite loop. This can lead to sustained CPU consumption and cause the affected server process to become unresponsive, resulting in a denial-of-service condition in unpatched environments.

🚨 Next has a Denial of Service with Server Components - Incomplete Fix Follow-Up

It was discovered that the fix for CVE-2025-55184 in React Server Components was incomplete and did not fully mitigate denial-of-service conditions across all payload types. As a result, certain crafted inputs could still trigger excessive resource consumption.

This vulnerability affects React versions 19.0.2, 19.1.3, and 19.2.2, as well as frameworks that bundle or depend on these versions, including Next.js 13.x, 14.x, 15.x, and 16.x when using the App Router. The issue is tracked upstream as CVE-2025-67779.

A malicious actor can send a specially crafted HTTP request to a Server Function endpoint that, when deserialized, causes the React Server Components runtime to enter an infinite loop. This can lead to sustained CPU consumption and cause the affected server process to become unresponsive, resulting in a denial-of-service condition in unpatched environments.

🚨 Next Server Actions Source Code Exposure

A vulnerability affects certain React packages for versions 19.0.0, 19.0.1, 19.1.0, 19.1.1, 19.1.2, 19.2.0, and 19.2.1 and frameworks that use the affected packages, including Next.js 15.x and 16.x using the App Router. The issue is tracked upstream as CVE-2025-55183.

A malicious HTTP request can be crafted and sent to any App Router endpoint that can return the compiled source code of Server Functions. This could reveal business logic, but would not expose secrets unless they were hardcoded directly into Server Function code.

🚨 Next Vulnerable to Denial of Service with Server Components

A vulnerability affects certain React packages for versions 19.0.0, 19.0.1, 19.1.0, 19.1.1, 19.1.2, 19.2.0, and 19.2.1 and frameworks that use the affected packages, including Next.js 15.x and 16.x using the App Router. The issue is tracked upstream as CVE-2025-55184.

A malicious HTTP request can be crafted and sent to any App Router endpoint that, when deserialized, can cause the server process to hang and consume CPU. This can result in denial of service in unpatched environments.

🚨 Next Vulnerable to Denial of Service with Server Components

A vulnerability affects certain React packages for versions 19.0.0, 19.0.1, 19.1.0, 19.1.1, 19.1.2, 19.2.0, and 19.2.1 and frameworks that use the affected packages, including Next.js 15.x and 16.x using the App Router. The issue is tracked upstream as CVE-2025-55184.

A malicious HTTP request can be crafted and sent to any App Router endpoint that, when deserialized, can cause the server process to hang and consume CPU. This can result in denial of service in unpatched environments.

🚨 Next Vulnerable to Denial of Service with Server Components

A vulnerability affects certain React packages for versions 19.0.0, 19.0.1, 19.1.0, 19.1.1, 19.1.2, 19.2.0, and 19.2.1 and frameworks that use the affected packages, including Next.js 15.x and 16.x using the App Router. The issue is tracked upstream as CVE-2025-55184.

A malicious HTTP request can be crafted and sent to any App Router endpoint that, when deserialized, can cause the server process to hang and consume CPU. This can result in denial of service in unpatched environments.

🚨 Next Vulnerable to Denial of Service with Server Components

A vulnerability affects certain React packages for versions 19.0.0, 19.0.1, 19.1.0, 19.1.1, 19.1.2, 19.2.0, and 19.2.1 and frameworks that use the affected packages, including Next.js 15.x and 16.x using the App Router. The issue is tracked upstream as CVE-2025-55184.

A malicious HTTP request can be crafted and sent to any App Router endpoint that, when deserialized, can cause the server process to hang and consume CPU. This can result in denial of service in unpatched environments.

🚨 Next Vulnerable to Denial of Service with Server Components

A vulnerability affects certain React packages for versions 19.0.0, 19.0.1, 19.1.0, 19.1.1, 19.1.2, 19.2.0, and 19.2.1 and frameworks that use the affected packages, including Next.js 15.x and 16.x using the App Router. The issue is tracked upstream as CVE-2025-55184.

A malicious HTTP request can be crafted and sent to any App Router endpoint that, when deserialized, can cause the server process to hang and consume CPU. This can result in denial of service in unpatched environments.

🚨 Next Vulnerable to Denial of Service with Server Components

A vulnerability affects certain React packages for versions 19.0.0, 19.0.1, 19.1.0, 19.1.1, 19.1.2, 19.2.0, and 19.2.1 and frameworks that use the affected packages, including Next.js 15.x and 16.x using the App Router. The issue is tracked upstream as CVE-2025-55184.

A malicious HTTP request can be crafted and sent to any App Router endpoint that, when deserialized, can cause the server process to hang and consume CPU. This can result in denial of service in unpatched environments.

🚨 Next Vulnerable to Denial of Service with Server Components

A vulnerability affects certain React packages for versions 19.0.0, 19.0.1, 19.1.0, 19.1.1, 19.1.2, 19.2.0, and 19.2.1 and frameworks that use the affected packages, including Next.js 15.x and 16.x using the App Router. The issue is tracked upstream as CVE-2025-55184.

A malicious HTTP request can be crafted and sent to any App Router endpoint that, when deserialized, can cause the server process to hang and consume CPU. This can result in denial of service in unpatched environments.

🚨 Next Vulnerable to Denial of Service with Server Components

A vulnerability affects certain React packages for versions 19.0.0, 19.0.1, 19.1.0, 19.1.1, 19.1.2, 19.2.0, and 19.2.1 and frameworks that use the affected packages, including Next.js 15.x and 16.x using the App Router. The issue is tracked upstream as CVE-2025-55184.

A malicious HTTP request can be crafted and sent to any App Router endpoint that, when deserialized, can cause the server process to hang and consume CPU. This can result in denial of service in unpatched environments.

🚨 Next Vulnerable to Denial of Service with Server Components

A vulnerability affects certain React packages for versions 19.0.0, 19.0.1, 19.1.0, 19.1.1, 19.1.2, 19.2.0, and 19.2.1 and frameworks that use the affected packages, including Next.js 15.x and 16.x using the App Router. The issue is tracked upstream as CVE-2025-55184.

A malicious HTTP request can be crafted and sent to any App Router endpoint that, when deserialized, can cause the server process to hang and consume CPU. This can result in denial of service in unpatched environments.

🚨 Next Server Actions Source Code Exposure

A vulnerability affects certain React packages for versions 19.0.0, 19.0.1, 19.1.0, 19.1.1, 19.1.2, 19.2.0, and 19.2.1 and frameworks that use the affected packages, including Next.js 15.x and 16.x using the App Router. The issue is tracked upstream as CVE-2025-55183.

A malicious HTTP request can be crafted and sent to any App Router endpoint that can return the compiled source code of Server Functions. This could reveal business logic, but would not expose secrets unless they were hardcoded directly into Server Function code.

🚨 Next Server Actions Source Code Exposure

A vulnerability affects certain React packages for versions 19.0.0, 19.0.1, 19.1.0, 19.1.1, 19.1.2, 19.2.0, and 19.2.1 and frameworks that use the affected packages, including Next.js 15.x and 16.x using the App Router. The issue is tracked upstream as CVE-2025-55183.

A malicious HTTP request can be crafted and sent to any App Router endpoint that can return the compiled source code of Server Functions. This could reveal business logic, but would not expose secrets unless they were hardcoded directly into Server Function code.

🚨 Next Server Actions Source Code Exposure

A vulnerability affects certain React packages for versions 19.0.0, 19.0.1, 19.1.0, 19.1.1, 19.1.2, 19.2.0, and 19.2.1 and frameworks that use the affected packages, including Next.js 15.x and 16.x using the App Router. The issue is tracked upstream as CVE-2025-55183.

A malicious HTTP request can be crafted and sent to any App Router endpoint that can return the compiled source code of Server Functions. This could reveal business logic, but would not expose secrets unless they were hardcoded directly into Server Function code.

🚨 Next Server Actions Source Code Exposure

A vulnerability affects certain React packages for versions 19.0.0, 19.0.1, 19.1.0, 19.1.1, 19.1.2, 19.2.0, and 19.2.1 and frameworks that use the affected packages, including Next.js 15.x and 16.x using the App Router. The issue is tracked upstream as CVE-2025-55183.

A malicious HTTP request can be crafted and sent to any App Router endpoint that can return the compiled source code of Server Functions. This could reveal business logic, but would not expose secrets unless they were hardcoded directly into Server Function code.

🚨 Next Server Actions Source Code Exposure

A vulnerability affects certain React packages for versions 19.0.0, 19.0.1, 19.1.0, 19.1.1, 19.1.2, 19.2.0, and 19.2.1 and frameworks that use the affected packages, including Next.js 15.x and 16.x using the App Router. The issue is tracked upstream as CVE-2025-55183.

A malicious HTTP request can be crafted and sent to any App Router endpoint that can return the compiled source code of Server Functions. This could reveal business logic, but would not expose secrets unless they were hardcoded directly into Server Function code.

🚨 Next Server Actions Source Code Exposure

A vulnerability affects certain React packages for versions 19.0.0, 19.0.1, 19.1.0, 19.1.1, 19.1.2, 19.2.0, and 19.2.1 and frameworks that use the affected packages, including Next.js 15.x and 16.x using the App Router. The issue is tracked upstream as CVE-2025-55183.

A malicious HTTP request can be crafted and sent to any App Router endpoint that can return the compiled source code of Server Functions. This could reveal business logic, but would not expose secrets unless they were hardcoded directly into Server Function code.

🚨 Next Server Actions Source Code Exposure

A vulnerability affects certain React packages for versions 19.0.0, 19.0.1, 19.1.0, 19.1.1, 19.1.2, 19.2.0, and 19.2.1 and frameworks that use the affected packages, including Next.js 15.x and 16.x using the App Router. The issue is tracked upstream as CVE-2025-55183.

A malicious HTTP request can be crafted and sent to any App Router endpoint that can return the compiled source code of Server Functions. This could reveal business logic, but would not expose secrets unless they were hardcoded directly into Server Function code.

🚨 Next.js is vulnerable to RCE in React flight protocol

A vulnerability affects certain React packages1 for versions 19.0.0, 19.1.0, 19.1.1, and 19.2.0 and frameworks that use the affected packages, including Next.js 15.x and 16.x using the App Router. The issue is tracked upstream as CVE-2025-55182.

Fixed in:
React: 19.0.1, 19.1.2, 19.2.1
Next.js: 15.0.5, 15.1.9, 15.2.6, 15.3.6, 15.4.8, 15.5.7, 16.0.7, 15.6.0-canary.58, 16.1.0-canary.12+

The vulnerability also affects experimental canary releases starting with 14.3.0-canary.77. Users on any of the 14.3 canary builds should either downgrade to a 14.x stable release or 14.3.0-canary.76.

All users of stable 15.x or 16.x Next.js versions should upgrade to a patched, stable version immediately.

1 The affected React packages are:

  • react-server-dom-parcel
  • react-server-dom-turbopack
  • react-server-dom-webpack

🚨 Next.js is vulnerable to RCE in React flight protocol

A vulnerability affects certain React packages1 for versions 19.0.0, 19.1.0, 19.1.1, and 19.2.0 and frameworks that use the affected packages, including Next.js 15.x and 16.x using the App Router. The issue is tracked upstream as CVE-2025-55182.

Fixed in:
React: 19.0.1, 19.1.2, 19.2.1
Next.js: 15.0.5, 15.1.9, 15.2.6, 15.3.6, 15.4.8, 15.5.7, 16.0.7, 15.6.0-canary.58, 16.1.0-canary.12+

The vulnerability also affects experimental canary releases starting with 14.3.0-canary.77. Users on any of the 14.3 canary builds should either downgrade to a 14.x stable release or 14.3.0-canary.76.

All users of stable 15.x or 16.x Next.js versions should upgrade to a patched, stable version immediately.

1 The affected React packages are:

  • react-server-dom-parcel
  • react-server-dom-turbopack
  • react-server-dom-webpack

🚨 Next.js is vulnerable to RCE in React flight protocol

A vulnerability affects certain React packages1 for versions 19.0.0, 19.1.0, 19.1.1, and 19.2.0 and frameworks that use the affected packages, including Next.js 15.x and 16.x using the App Router. The issue is tracked upstream as CVE-2025-55182.

Fixed in:
React: 19.0.1, 19.1.2, 19.2.1
Next.js: 15.0.5, 15.1.9, 15.2.6, 15.3.6, 15.4.8, 15.5.7, 16.0.7, 15.6.0-canary.58, 16.1.0-canary.12+

The vulnerability also affects experimental canary releases starting with 14.3.0-canary.77. Users on any of the 14.3 canary builds should either downgrade to a 14.x stable release or 14.3.0-canary.76.

All users of stable 15.x or 16.x Next.js versions should upgrade to a patched, stable version immediately.

1 The affected React packages are:

  • react-server-dom-parcel
  • react-server-dom-turbopack
  • react-server-dom-webpack

🚨 Next.js is vulnerable to RCE in React flight protocol

A vulnerability affects certain React packages1 for versions 19.0.0, 19.1.0, 19.1.1, and 19.2.0 and frameworks that use the affected packages, including Next.js 15.x and 16.x using the App Router. The issue is tracked upstream as CVE-2025-55182.

Fixed in:
React: 19.0.1, 19.1.2, 19.2.1
Next.js: 15.0.5, 15.1.9, 15.2.6, 15.3.6, 15.4.8, 15.5.7, 16.0.7, 15.6.0-canary.58, 16.1.0-canary.12+

The vulnerability also affects experimental canary releases starting with 14.3.0-canary.77. Users on any of the 14.3 canary builds should either downgrade to a 14.x stable release or 14.3.0-canary.76.

All users of stable 15.x or 16.x Next.js versions should upgrade to a patched, stable version immediately.

1 The affected React packages are:

  • react-server-dom-parcel
  • react-server-dom-turbopack
  • react-server-dom-webpack

🚨 Next.js is vulnerable to RCE in React flight protocol

A vulnerability affects certain React packages1 for versions 19.0.0, 19.1.0, 19.1.1, and 19.2.0 and frameworks that use the affected packages, including Next.js 15.x and 16.x using the App Router. The issue is tracked upstream as CVE-2025-55182.

Fixed in:
React: 19.0.1, 19.1.2, 19.2.1
Next.js: 15.0.5, 15.1.9, 15.2.6, 15.3.6, 15.4.8, 15.5.7, 16.0.7, 15.6.0-canary.58, 16.1.0-canary.12+

The vulnerability also affects experimental canary releases starting with 14.3.0-canary.77. Users on any of the 14.3 canary builds should either downgrade to a 14.x stable release or 14.3.0-canary.76.

All users of stable 15.x or 16.x Next.js versions should upgrade to a patched, stable version immediately.

1 The affected React packages are:

  • react-server-dom-parcel
  • react-server-dom-turbopack
  • react-server-dom-webpack

🚨 Next.js is vulnerable to RCE in React flight protocol

A vulnerability affects certain React packages1 for versions 19.0.0, 19.1.0, 19.1.1, and 19.2.0 and frameworks that use the affected packages, including Next.js 15.x and 16.x using the App Router. The issue is tracked upstream as CVE-2025-55182.

Fixed in:
React: 19.0.1, 19.1.2, 19.2.1
Next.js: 15.0.5, 15.1.9, 15.2.6, 15.3.6, 15.4.8, 15.5.7, 16.0.7, 15.6.0-canary.58, 16.1.0-canary.12+

The vulnerability also affects experimental canary releases starting with 14.3.0-canary.77. Users on any of the 14.3 canary builds should either downgrade to a 14.x stable release or 14.3.0-canary.76.

All users of stable 15.x or 16.x Next.js versions should upgrade to a patched, stable version immediately.

1 The affected React packages are:

  • react-server-dom-parcel
  • react-server-dom-turbopack
  • react-server-dom-webpack

🚨 Next.js is vulnerable to RCE in React flight protocol

A vulnerability affects certain React packages1 for versions 19.0.0, 19.1.0, 19.1.1, and 19.2.0 and frameworks that use the affected packages, including Next.js 15.x and 16.x using the App Router. The issue is tracked upstream as CVE-2025-55182.

Fixed in:
React: 19.0.1, 19.1.2, 19.2.1
Next.js: 15.0.5, 15.1.9, 15.2.6, 15.3.6, 15.4.8, 15.5.7, 16.0.7, 15.6.0-canary.58, 16.1.0-canary.12+

The vulnerability also affects experimental canary releases starting with 14.3.0-canary.77. Users on any of the 14.3 canary builds should either downgrade to a 14.x stable release or 14.3.0-canary.76.

All users of stable 15.x or 16.x Next.js versions should upgrade to a patched, stable version immediately.

1 The affected React packages are:

  • react-server-dom-parcel
  • react-server-dom-turbopack
  • react-server-dom-webpack

🚨 Next.js Content Injection Vulnerability for Image Optimization

A vulnerability in Next.js Image Optimization has been fixed in v15.4.5 and v14.2.31. The issue allowed attacker-controlled external image sources to trigger file downloads with arbitrary content and filenames under specific configurations. This behavior could be abused for phishing or malicious file delivery.

All users relying on images.domains or images.remotePatterns are encouraged to upgrade and verify that external image sources are strictly validated.

More details at Vercel Changelog

🚨 Next.js Affected by Cache Key Confusion for Image Optimization API Routes

A vulnerability in Next.js Image Optimization has been fixed in v15.4.5 and v14.2.31. When images returned from API routes vary based on request headers (such as Cookie or Authorization), these responses could be incorrectly cached and served to unauthorized users due to a cache key confusion bug.

All users are encouraged to upgrade if they use API routes to serve images that depend on request headers and have image optimization enabled.

More details at Vercel Changelog

🚨 Next.js Improper Middleware Redirect Handling Leads to SSRF

A vulnerability in Next.js Middleware has been fixed in v14.2.32 and v15.4.7. The issue occurred when request headers were directly passed into NextResponse.next(). In self-hosted applications, this could allow Server-Side Request Forgery (SSRF) if certain sensitive headers from the incoming request were reflected back into the response.

All users implementing custom middleware logic in self-hosted environments are strongly encouraged to upgrade and verify correct usage of the next() function.

More details at Vercel Changelog

🚨 Next.js Improper Middleware Redirect Handling Leads to SSRF

A vulnerability in Next.js Middleware has been fixed in v14.2.32 and v15.4.7. The issue occurred when request headers were directly passed into NextResponse.next(). In self-hosted applications, this could allow Server-Side Request Forgery (SSRF) if certain sensitive headers from the incoming request were reflected back into the response.

All users implementing custom middleware logic in self-hosted environments are strongly encouraged to upgrade and verify correct usage of the next() function.

More details at Vercel Changelog

🚨 Next.js Content Injection Vulnerability for Image Optimization

A vulnerability in Next.js Image Optimization has been fixed in v15.4.5 and v14.2.31. The issue allowed attacker-controlled external image sources to trigger file downloads with arbitrary content and filenames under specific configurations. This behavior could be abused for phishing or malicious file delivery.

All users relying on images.domains or images.remotePatterns are encouraged to upgrade and verify that external image sources are strictly validated.

More details at Vercel Changelog

🚨 Next.JS vulnerability can lead to DoS via cache poisoning

Summary

A vulnerability affecting Next.js has been addressed. It impacted versions 15.0.4 through 15.1.8 and involved a cache poisoning bug leading to a Denial of Service (DoS) condition.

Under certain conditions, this issue may allow a HTTP 204 response to be cached for static pages, leading to the 204 response being served to all users attempting to access the page

More details: CVE-2025-49826

Credits

  • Allam Rachid zhero;
  • Allam Yasser (inzo)

🚨 Next.js has a Cache poisoning vulnerability due to omission of the Vary header

Summary

A cache poisoning issue in Next.js App Router >=15.3.0 and < 15.3.3 may have allowed RSC payloads to be cached and served in place of HTML, under specific conditions involving middleware and redirects. This issue has been fixed in Next.js 15.3.3.

Users on affected versions should upgrade immediately and redeploy to ensure proper caching behavior.

More details: CVE-2025-49005

🚨 Information exposure in Next.js dev server due to lack of origin verification

Summary

A low-severity vulnerability in Next.js has been fixed in version 15.2.2. This issue may have allowed limited source code exposure when the dev server was running with the App Router enabled. The vulnerability only affects local development environments and requires the user to visit a malicious webpage while npm run dev is active.

Because the mitigation is potentially a breaking change for some development setups, to opt-in to the fix, you must configure allowedDevOrigins in your next config after upgrading to a patched version. Learn more.

Learn more: https://vercel.com/changelog/cve-2025-48068

Credit

Thanks to sapphi-red and Radman Siddiki for responsibly disclosing this issue.

🚨 Information exposure in Next.js dev server due to lack of origin verification

Summary

A low-severity vulnerability in Next.js has been fixed in version 15.2.2. This issue may have allowed limited source code exposure when the dev server was running with the App Router enabled. The vulnerability only affects local development environments and requires the user to visit a malicious webpage while npm run dev is active.

Because the mitigation is potentially a breaking change for some development setups, to opt-in to the fix, you must configure allowedDevOrigins in your next config after upgrading to a patched version. Learn more.

Learn more: https://vercel.com/changelog/cve-2025-48068

Credit

Thanks to sapphi-red and Radman Siddiki for responsibly disclosing this issue.

🚨 Next.js Race Condition to Cache Poisoning

Summary
We received a responsible disclosure from Allam Rachid (zhero) for a low-severity race-condition vulnerability in Next.js. This issue only affects the Pages Router under certain misconfigurations, causing normal endpoints to serve pageProps data instead of standard HTML.

Learn more here

Credit
Thank you to Allam Rachid (zhero) for the responsible disclosure. This research was rewarded as part of our bug bounty program.

🚨 Next.js Race Condition to Cache Poisoning

Summary
We received a responsible disclosure from Allam Rachid (zhero) for a low-severity race-condition vulnerability in Next.js. This issue only affects the Pages Router under certain misconfigurations, causing normal endpoints to serve pageProps data instead of standard HTML.

Learn more here

Credit
Thank you to Allam Rachid (zhero) for the responsible disclosure. This research was rewarded as part of our bug bounty program.

🚨 Next.js may leak x-middleware-subrequest-id to external hosts

Summary

In the process of remediating CVE-2025-29927, we looked at other possible exploits of Middleware. We independently verified this low severity vulnerability in parallel with two reports from independent researchers.

Learn more here.

Credit

Thank you to Jinseo Kim kjsman andΒ RyotaK (GMO Flatt Security Inc.) with takumi-san.aiΒ for the responsible disclosure. These researchers were awarded as part of our bug bounty program.

🚨 Next.js may leak x-middleware-subrequest-id to external hosts

Summary

In the process of remediating CVE-2025-29927, we looked at other possible exploits of Middleware. We independently verified this low severity vulnerability in parallel with two reports from independent researchers.

Learn more here.

Credit

Thank you to Jinseo Kim kjsman andΒ RyotaK (GMO Flatt Security Inc.) with takumi-san.aiΒ for the responsible disclosure. These researchers were awarded as part of our bug bounty program.

🚨 Next.js may leak x-middleware-subrequest-id to external hosts

Summary

In the process of remediating CVE-2025-29927, we looked at other possible exploits of Middleware. We independently verified this low severity vulnerability in parallel with two reports from independent researchers.

Learn more here.

Credit

Thank you to Jinseo Kim kjsman andΒ RyotaK (GMO Flatt Security Inc.) with takumi-san.aiΒ for the responsible disclosure. These researchers were awarded as part of our bug bounty program.

🚨 Authorization Bypass in Next.js Middleware

Impact

It is possible to bypass authorization checks within a Next.js application, if the authorization check occurs in middleware.

Patches

  • For Next.js 15.x, this issue is fixed in 15.2.3
  • For Next.js 14.x, this issue is fixed in 14.2.25
  • For Next.js 13.x, this issue is fixed in 13.5.9
  • For Next.js 12.x, this issue is fixed in 12.3.5
  • For Next.js 11.x, consult the below workaround.

Note: Next.js deployments hosted on Vercel are automatically protected against this vulnerability.

Workaround

If patching to a safe version is infeasible, we recommend that you prevent external user requests which contain the x-middleware-subrequest header from reaching your Next.js application.

Credits

  • Allam Rachid (zhero;)
  • Allam Yasser (inzo_)

🚨 Authorization Bypass in Next.js Middleware

Impact

It is possible to bypass authorization checks within a Next.js application, if the authorization check occurs in middleware.

Patches

  • For Next.js 15.x, this issue is fixed in 15.2.3
  • For Next.js 14.x, this issue is fixed in 14.2.25
  • For Next.js 13.x, this issue is fixed in 13.5.9
  • For Next.js 12.x, this issue is fixed in 12.3.5
  • For Next.js 11.x, consult the below workaround.

Note: Next.js deployments hosted on Vercel are automatically protected against this vulnerability.

Workaround

If patching to a safe version is infeasible, we recommend that you prevent external user requests which contain the x-middleware-subrequest header from reaching your Next.js application.

Credits

  • Allam Rachid (zhero;)
  • Allam Yasser (inzo_)

🚨 Authorization Bypass in Next.js Middleware

Impact

It is possible to bypass authorization checks within a Next.js application, if the authorization check occurs in middleware.

Patches

  • For Next.js 15.x, this issue is fixed in 15.2.3
  • For Next.js 14.x, this issue is fixed in 14.2.25
  • For Next.js 13.x, this issue is fixed in 13.5.9
  • For Next.js 12.x, this issue is fixed in 12.3.5
  • For Next.js 11.x, consult the below workaround.

Note: Next.js deployments hosted on Vercel are automatically protected against this vulnerability.

Workaround

If patching to a safe version is infeasible, we recommend that you prevent external user requests which contain the x-middleware-subrequest header from reaching your Next.js application.

Credits

  • Allam Rachid (zhero;)
  • Allam Yasser (inzo_)

🚨 Next.js Allows a Denial of Service (DoS) with Server Actions

Impact

A Denial of Service (DoS) attack allows attackers to construct requests that leaves requests to Server Actions hanging until the hosting provider cancels the function execution.

Note: Next.js server is idle during that time and only keeps the connection open. CPU and memory footprint are low during that time.

Deployments without any protection against long running Server Action invocations are especially vulnerable. Hosting providers like Vercel or Netlify set a default maximum duration on function execution to reduce the risk of excessive billing.

This is the same issue as if the incoming HTTP request has an invalid Content-Length header or never closes. If the host has no other mitigations to those then this vulnerability is novel.

This vulnerability affects only Next.js deployments using Server Actions.

Patches

This vulnerability was resolved in Next.js 14.2.21, 15.1.2, and 13.5.8. We recommend that users upgrade to a safe version.

Workarounds

There are no official workarounds for this vulnerability.

Credits

Thanks to the PackDraw team for responsibly disclosing this vulnerability.

🚨 Next.js Allows a Denial of Service (DoS) with Server Actions

Impact

A Denial of Service (DoS) attack allows attackers to construct requests that leaves requests to Server Actions hanging until the hosting provider cancels the function execution.

Note: Next.js server is idle during that time and only keeps the connection open. CPU and memory footprint are low during that time.

Deployments without any protection against long running Server Action invocations are especially vulnerable. Hosting providers like Vercel or Netlify set a default maximum duration on function execution to reduce the risk of excessive billing.

This is the same issue as if the incoming HTTP request has an invalid Content-Length header or never closes. If the host has no other mitigations to those then this vulnerability is novel.

This vulnerability affects only Next.js deployments using Server Actions.

Patches

This vulnerability was resolved in Next.js 14.2.21, 15.1.2, and 13.5.8. We recommend that users upgrade to a safe version.

Workarounds

There are no official workarounds for this vulnerability.

Credits

Thanks to the PackDraw team for responsibly disclosing this vulnerability.

🚨 Next.js Allows a Denial of Service (DoS) with Server Actions

Impact

A Denial of Service (DoS) attack allows attackers to construct requests that leaves requests to Server Actions hanging until the hosting provider cancels the function execution.

Note: Next.js server is idle during that time and only keeps the connection open. CPU and memory footprint are low during that time.

Deployments without any protection against long running Server Action invocations are especially vulnerable. Hosting providers like Vercel or Netlify set a default maximum duration on function execution to reduce the risk of excessive billing.

This is the same issue as if the incoming HTTP request has an invalid Content-Length header or never closes. If the host has no other mitigations to those then this vulnerability is novel.

This vulnerability affects only Next.js deployments using Server Actions.

Patches

This vulnerability was resolved in Next.js 14.2.21, 15.1.2, and 13.5.8. We recommend that users upgrade to a safe version.

Workarounds

There are no official workarounds for this vulnerability.

Credits

Thanks to the PackDraw team for responsibly disclosing this vulnerability.

🚨 Next.js authorization bypass vulnerability

Impact

If a Next.js application is performing authorization in middleware based on pathname, it was possible for this authorization to be bypassed.

Patches

This issue was patched in Next.js 14.2.15 and later.

If your Next.js application is hosted on Vercel, this vulnerability has been automatically mitigated, regardless of Next.js version.

Workarounds

There are no official workarounds for this vulnerability.

Credits

We'd like to thank tyage (GMO CyberSecurity by IERAE) for responsible disclosure of this issue.

🚨 Denial of Service condition in Next.js image optimization

Impact

The image optimization feature of Next.js contained a vulnerability which allowed for a potential Denial of Service (DoS) condition which could lead to excessive CPU consumption.

Not affected:

  • The next.config.js file is configured with images.unoptimized set to true or images.loader set to a non-default value.
  • The Next.js application is hosted on Vercel.

Patches

This issue was fully patched in Next.js 14.2.7. We recommend that users upgrade to at least this version.

Workarounds

Ensure that the next.config.js file has either images.unoptimized, images.loader or images.loaderFile assigned.

Credits

Brandon Dahler (brandondahler), AWS
Dimitrios Vlastaras

🚨 Next.js Cache Poisoning

Impact

By sending a crafted HTTP request, it is possible to poison the cache of a non-dynamic server-side rendered route in the pages router (this does not affect the app router). When this crafted request is sent it could coerce Next.js to cache a route that is meant to not be cached and send a Cache-Control: s-maxage=1, stale-while-revalidate header which some upstream CDNs may cache as well.

To be potentially affected all of the following must apply:

  • Next.js between 13.5.1 and 14.2.9
  • Using pages router
  • Using non-dynamic server-side rendered routes e.g. pages/dashboard.tsx not pages/blog/[slug].tsx

The below configurations are unaffected:

  • Deployments using only app router
  • Deployments on Vercel are not affected

Patches

This vulnerability was resolved in Next.js v13.5.7, v14.2.10, and later. We recommend upgrading regardless of whether you can reproduce the issue or not.

Workarounds

There are no official or recommended workarounds for this issue, we recommend that users patch to a safe version.

Credits

  • Allam Rachid (zhero_)
  • Henry Chen

🚨 Next.js Cache Poisoning

Impact

By sending a crafted HTTP request, it is possible to poison the cache of a non-dynamic server-side rendered route in the pages router (this does not affect the app router). When this crafted request is sent it could coerce Next.js to cache a route that is meant to not be cached and send a Cache-Control: s-maxage=1, stale-while-revalidate header which some upstream CDNs may cache as well.

To be potentially affected all of the following must apply:

  • Next.js between 13.5.1 and 14.2.9
  • Using pages router
  • Using non-dynamic server-side rendered routes e.g. pages/dashboard.tsx not pages/blog/[slug].tsx

The below configurations are unaffected:

  • Deployments using only app router
  • Deployments on Vercel are not affected

Patches

This vulnerability was resolved in Next.js v13.5.7, v14.2.10, and later. We recommend upgrading regardless of whether you can reproduce the issue or not.

Workarounds

There are no official or recommended workarounds for this issue, we recommend that users patch to a safe version.

Credits

  • Allam Rachid (zhero_)
  • Henry Chen

🚨 Next.js Server-Side Request Forgery in Server Actions

Impact

A Server-Side Request Forgery (SSRF) vulnerability was identified in Next.js Server Actions by security researchers at Assetnote. If the Host header is modified, and the below conditions are also met, an attacker may be able to make requests that appear to be originating from the Next.js application server itself.

Prerequisites

  • Next.js (<14.1.1) is running in a self-hosted* manner.
  • The Next.js application makes use of Server Actions.
  • The Server Action performs a redirect to a relative path which starts with a /.

* Many hosting providers (including Vercel) route requests based on the Host header, so we do not believe that this vulnerability affects any Next.js applications where routing is done in this manner.

Patches

This vulnerability was patched in #62561 and fixed in Next.js 14.1.1.

Workarounds

There are no official workarounds for this vulnerability. We recommend upgrading to Next.js 14.1.1.

Credit

Vercel and the Next.js team thank Assetnote for responsibly disclosing this issue to us, and for working with us to verify the fix. Thanks to:

Adam Kues - Assetnote
Shubham Shah - Assetnote

Release Notes

Too many releases to show here. View the full release notes.

Commits

See the full diff on Github. The new version differs by 6 commits:

↗️ @​babel/code-frame (indirect, 7.22.13 β†’ 7.28.6) Β· Repo Β· Changelog

Release Notes

7.27.1

v7.27.1 (2025-04-30)

Thanks @kermanx and @woaitsAryan for your first PRs!

πŸ‘“ Spec Compliance

  • babel-parser
  • babel-parser, babel-types

πŸ› Bug Fix

  • babel-plugin-proposal-destructuring-private, babel-plugin-proposal-do-expressions, babel-traverse
  • babel-helper-wrap-function, babel-plugin-transform-async-to-generator
    • #17251 Fix: propagate argument evaluation errors through async promise chain (@magic-akari)
  • babel-helper-remap-async-to-generator, babel-plugin-transform-async-to-generator
  • babel-helper-fixtures, babel-parser
    • #17233 Create ChainExpression within TSInstantiationExpression (@JLHwung)
  • babel-generator, babel-parser
    • #17226 Fill optional AST properties when both estree and typescript parser plugin are enabled (Part 2) (@JLHwung)
  • babel-parser
    • #17224 Fill optional AST properties when both estree and typescript parser plugin are enabled (Part 1) (@JLHwung)
    • #17080 Fix start of TSParameterProperty (@JLHwung)
  • babel-compat-data, babel-preset-env
  • babel-traverse
    • #17156 fix: Objects and arrays with multiple references should not be evaluated (@liuxingbaoyu)
  • babel-generator

πŸ’… Polish

  • babel-plugin-bugfix-v8-spread-parameters-in-optional-chaining, babel-plugin-proposal-decorators, babel-plugin-transform-arrow-functions, babel-plugin-transform-class-properties, babel-plugin-transform-destructuring, babel-plugin-transform-object-rest-spread, babel-plugin-transform-optional-chaining, babel-plugin-transform-parameters, babel-traverse

🏠 Internal

  • babel-runtime-corejs2, babel-runtime-corejs3, babel-runtime
  • babel-compat-data, babel-preset-env
  • babel-compat-data, babel-standalone
  • babel-register
  • babel-helpers, babel-plugin-transform-async-generator-functions, babel-plugin-transform-regenerator, babel-preset-env, babel-runtime-corejs3
  • All packages

πŸ”¬ Output optimization

  • babel-helpers, babel-plugin-transform-modules-commonjs, babel-runtime-corejs3
  • babel-helpers, babel-plugin-transform-async-generator-functions, babel-plugin-transform-regenerator, babel-preset-env, babel-runtime-corejs3

Committers: 9

7.26.2

v7.26.2 (2024-10-30)

πŸ› Bug Fix

Committers: 6

7.26.0

v7.26.0 (2024-10-25)

Thanks @timofei-iatsenko for your first PR!

You can find the release blog post with some highlights at https://babeljs.io/blog/2024/10/25/7.26.0.

πŸš€ New Feature

  • babel-core, babel-generator, babel-parser, babel-plugin-syntax-import-assertions, babel-plugin-syntax-import-attributes, babel-preset-env, babel-standalone, babel-types
  • babel-core
  • babel-compat-data, babel-plugin-proposal-regexp-modifiers, babel-plugin-transform-regexp-modifiers, babel-preset-env, babel-standalone
  • babel-parser
  • babel-generator, babel-parser, babel-plugin-syntax-flow
  • babel-helpers, babel-preset-typescript, babel-runtime-corejs3
  • babel-generator, babel-parser

πŸ› Bug Fix

πŸ’… Polish

  • babel-plugin-proposal-json-modules, babel-plugin-transform-json-modules, babel-standalone

🏠 Internal

  • babel-code-frame, babel-highlight
  • babel-generator, babel-parser, babel-types

πŸƒβ€β™€οΈ Performance

  • babel-helper-module-transforms, babel-plugin-transform-modules-commonjs

Committers: 5

7.25.9

v7.25.9 (2024-10-22)

Thanks @victorenator for your first PR!

πŸ› Bug Fix

  • babel-parser, babel-template, babel-types
  • babel-helper-compilation-targets, babel-preset-env
  • Other

🏠 Internal

  • babel-helper-transform-fixture-test-runner
  • Every package

πŸƒβ€β™€οΈ Performance

  • babel-parser, babel-types

Committers: 4

7.25.7

v7.25.7 (2024-10-02)

Thanks @DylanPiercey and @YuHyeonWook for your first PRs!

πŸ› Bug Fix

πŸ’… Polish

🏠 Internal

  • babel-core
  • babel-helper-compilation-targets, babel-helper-plugin-utils, babel-preset-env
  • babel-plugin-proposal-destructuring-private, babel-plugin-syntax-decimal, babel-plugin-syntax-import-reflection, babel-standalone
  • babel-generator

πŸƒβ€β™€οΈ Performance

Committers: 8

7.24.7

v7.24.7 (2024-06-05)

πŸ› Bug Fix

  • babel-node
  • babel-traverse
  • babel-helper-transform-fixture-test-runner, babel-plugin-proposal-explicit-resource-management

🏠 Internal

  • babel-helpers, babel-runtime-corejs2, babel-runtime-corejs3, babel-runtime

Committers: 7

7.24.6

v7.24.6 (2024-05-24)

Thanks @amjed-98, @blakewilson, @coelhucas, and @SukkaW for your first PRs!

πŸ› Bug Fix

  • babel-helper-create-class-features-plugin, babel-plugin-transform-class-properties
  • babel-core, babel-generator, babel-plugin-transform-modules-commonjs
  • babel-helper-create-class-features-plugin, babel-plugin-proposal-decorators
  • babel-helpers, babel-plugin-proposal-decorators, babel-runtime-corejs3
    • #16483 Fix: throw TypeError if addInitializer is called after finished (@JLHwung)
  • babel-parser, babel-plugin-transform-typescript

🏠 Internal

  • babel-core, babel-helpers, babel-plugin-transform-runtime, babel-preset-env, babel-runtime-corejs2, babel-runtime-corejs3, babel-runtime
  • babel-helpers
  • babel-cli, babel-helpers, babel-plugin-external-helpers, babel-plugin-proposal-decorators, babel-plugin-transform-class-properties, babel-plugin-transform-modules-commonjs, babel-plugin-transform-modules-systemjs, babel-plugin-transform-runtime, babel-preset-env, babel-runtime-corejs2, babel-runtime-corejs3, babel-runtime
  • babel-parser, babel-traverse
  • Other

Committers: 9

7.24.2

v7.24.2 (2024-03-19)

πŸ› Bug Fix

Committers: 1

7.24.1

v7.24.1 (2024-03-19)

πŸ› Bug Fix

  • babel-helper-create-class-features-plugin, babel-plugin-proposal-decorators
  • babel-plugin-proposal-decorators, babel-plugin-proposal-json-modules, babel-plugin-transform-async-generator-functions, babel-plugin-transform-regenerator, babel-plugin-transform-runtime, babel-preset-env
  • babel-helper-create-class-features-plugin, babel-plugin-proposal-decorators, babel-plugin-proposal-pipeline-operator, babel-plugin-transform-class-properties
  • babel-helper-create-class-features-plugin, babel-helper-replace-supers, babel-plugin-proposal-decorators, babel-plugin-transform-class-properties

πŸ“ Documentation

🏠 Internal

  • babel-code-frame, babel-highlight
  • babel-helper-fixtures, babel-helpers, babel-plugin-bugfix-safari-id-destructuring-collision-in-function-expression, babel-plugin-proposal-pipeline-operator, babel-plugin-transform-unicode-sets-regex, babel-preset-env, babel-preset-flow
  • babel-helper-module-imports, babel-plugin-proposal-import-wasm-source, babel-plugin-proposal-json-modules, babel-plugin-proposal-record-and-tuple, babel-plugin-transform-react-jsx-development, babel-plugin-transform-react-jsx
  • Other

πŸ”¬ Output optimization

  • babel-helper-replace-supers, babel-plugin-transform-class-properties, babel-plugin-transform-classes, babel-plugin-transform-parameters, babel-plugin-transform-runtime
  • babel-plugin-transform-class-properties, babel-plugin-transform-classes
  • babel-plugin-proposal-decorators, babel-plugin-transform-class-properties, babel-plugin-transform-object-rest-spread, babel-traverse
  • babel-core, babel-plugin-external-helpers, babel-plugin-proposal-decorators, babel-plugin-proposal-function-bind, babel-plugin-transform-class-properties, babel-plugin-transform-classes, babel-plugin-transform-flow-comments, babel-plugin-transform-flow-strip-types, babel-plugin-transform-function-name, babel-plugin-transform-modules-systemjs, babel-plugin-transform-parameters, babel-plugin-transform-private-property-in-object, babel-plugin-transform-react-jsx, babel-plugin-transform-runtime, babel-plugin-transform-spread, babel-plugin-transform-typescript, babel-preset-env

Committers: 4

7.23.5

v7.23.5 (2023-11-29)

πŸ‘“ Spec Compliance

  • babel-plugin-proposal-decorators
  • babel-helpers, babel-plugin-proposal-decorators

πŸ› Bug Fix

  • babel-traverse, babel-types
  • babel-plugin-transform-classes
  • babel-generator
  • babel-helpers
  • babel-helper-create-class-features-plugin, babel-plugin-transform-class-properties, babel-plugin-transform-typescript
  • babel-generator, babel-plugin-transform-modules-commonjs, babel-plugin-transform-parameters, babel-plugin-transform-typescript, babel-traverse
  • babel-eslint-plugin

πŸ”¬ Output optimization

Committers: 4

7.23.4

v7.23.4 (2023-11-20)

πŸ› Bug Fix

Committers: 4

Does any of this look wrong? Please let us know.

Commits

See the full diff on Github. The new version differs by more commits than we can show here.

↗️ @​babel/helper-validator-identifier (indirect, 7.22.20 β†’ 7.28.5) Β· Repo Β· Changelog

Release Notes

7.28.5

v7.28.5 (2025-10-23)

Thank you @CO0Ki3, @Olexandr88, and @youthfulhps for your first PRs!

πŸ‘“ Spec Compliance

  • babel-parser
  • babel-helper-validator-identifier

πŸ› Bug Fix

  • babel-plugin-proposal-destructuring-private
  • babel-parser
  • babel-plugin-proposal-discard-binding, babel-plugin-transform-destructuring
  • babel-helper-create-class-features-plugin, babel-helper-member-expression-to-functions, babel-plugin-transform-block-scoping, babel-plugin-transform-optional-chaining, babel-traverse, babel-types
    • #17503 Fix JSXIdentifier handling in isReferencedIdentifier (@JLHwung)
  • babel-traverse

🏠 Internal

πŸƒβ€β™€οΈ Performance

Committers: 8

7.27.1

v7.27.1 (2025-04-30)

Thanks @kermanx and @woaitsAryan for your first PRs!

πŸ‘“ Spec Compliance

  • babel-parser
  • babel-parser, babel-types

πŸ› Bug Fix

  • babel-plugin-proposal-destructuring-private, babel-plugin-proposal-do-expressions, babel-traverse
  • babel-helper-wrap-function, babel-plugin-transform-async-to-generator
    • #17251 Fix: propagate argument evaluation errors through async promise chain (@magic-akari)
  • babel-helper-remap-async-to-generator, babel-plugin-transform-async-to-generator
  • babel-helper-fixtures, babel-parser
    • #17233 Create ChainExpression within TSInstantiationExpression (@JLHwung)
  • babel-generator, babel-parser
    • #17226 Fill optional AST properties when both estree and typescript parser plugin are enabled (Part 2) (@JLHwung)
  • babel-parser
    • #17224 Fill optional AST properties when both estree and typescript parser plugin are enabled (Part 1) (@JLHwung)
    • #17080 Fix start of TSParameterProperty (@JLHwung)
  • babel-compat-data, babel-preset-env
  • babel-traverse
    • #17156 fix: Objects and arrays with multiple references should not be evaluated (@liuxingbaoyu)
  • babel-generator

πŸ’… Polish

  • babel-plugin-bugfix-v8-spread-parameters-in-optional-chaining, babel-plugin-proposal-decorators, babel-plugin-transform-arrow-functions, babel-plugin-transform-class-properties, babel-plugin-transform-destructuring, babel-plugin-transform-object-rest-spread, babel-plugin-transform-optional-chaining, babel-plugin-transform-parameters, babel-traverse

🏠 Internal

  • babel-runtime-corejs2, babel-runtime-corejs3, babel-runtime
  • babel-compat-data, babel-preset-env
  • babel-compat-data, babel-standalone
  • babel-register
  • babel-helpers, babel-plugin-transform-async-generator-functions, babel-plugin-transform-regenerator, babel-preset-env, babel-runtime-corejs3
  • All packages

πŸ”¬ Output optimization

  • babel-helpers, babel-plugin-transform-modules-commonjs, babel-runtime-corejs3
  • babel-helpers, babel-plugin-transform-async-generator-functions, babel-plugin-transform-regenerator, babel-preset-env, babel-runtime-corejs3

Committers: 9

7.25.9

v7.25.9 (2024-10-22)

Thanks @victorenator for your first PR!

πŸ› Bug Fix

  • babel-parser, babel-template, babel-types
  • babel-helper-compilation-targets, babel-preset-env
  • Other

🏠 Internal

  • babel-helper-transform-fixture-test-runner
  • Every package

πŸƒβ€β™€οΈ Performance

  • babel-parser, babel-types

Committers: 4

7.25.7

v7.25.7 (2024-10-02)

Thanks @DylanPiercey and @YuHyeonWook for your first PRs!

πŸ› Bug Fix

πŸ’… Polish

🏠 Internal

  • babel-core
  • babel-helper-compilation-targets, babel-helper-plugin-utils, babel-preset-env
  • babel-plugin-proposal-destructuring-private, babel-plugin-syntax-decimal, babel-plugin-syntax-import-reflection, babel-standalone
  • babel-generator

πŸƒβ€β™€οΈ Performance

Committers: 8

7.24.7

v7.24.7 (2024-06-05)

πŸ› Bug Fix

  • babel-node
  • babel-traverse
  • babel-helper-transform-fixture-test-runner, babel-plugin-proposal-explicit-resource-management

🏠 Internal

  • babel-helpers, babel-runtime-corejs2, babel-runtime-corejs3, babel-runtime

Committers: 7

7.24.6

v7.24.6 (2024-05-24)

Thanks @amjed-98, @blakewilson, @coelhucas, and @SukkaW for your first PRs!

πŸ› Bug Fix

  • babel-helper-create-class-features-plugin, babel-plugin-transform-class-properties
  • babel-core, babel-generator, babel-plugin-transform-modules-commonjs
  • babel-helper-create-class-features-plugin, babel-plugin-proposal-decorators
  • babel-helpers, babel-plugin-proposal-decorators, babel-runtime-corejs3
    • #16483 Fix: throw TypeError if addInitializer is called after finished (@JLHwung)
  • babel-parser, babel-plugin-transform-typescript

🏠 Internal

  • babel-core, babel-helpers, babel-plugin-transform-runtime, babel-preset-env, babel-runtime-corejs2, babel-runtime-corejs3, babel-runtime
  • babel-helpers
  • babel-cli, babel-helpers, babel-plugin-external-helpers, babel-plugin-proposal-decorators, babel-plugin-transform-class-properties, babel-plugin-transform-modules-commonjs, babel-plugin-transform-modules-systemjs, babel-plugin-transform-runtime, babel-preset-env, babel-runtime-corejs2, babel-runtime-corejs3, babel-runtime
  • babel-parser, babel-traverse
  • Other

Committers: 9

7.24.5

v7.24.5 (2024-04-29)

Thanks @romgrk and @sossost for your first PRs!

πŸ› Bug Fix

  • babel-plugin-transform-classes, babel-traverse
  • babel-helpers, babel-plugin-proposal-explicit-resource-management, babel-runtime-corejs3

πŸ’… Polish

  • babel-parser

🏠 Internal

  • Other
  • babel-parser
  • babel-helper-create-class-features-plugin, babel-helper-member-expression-to-functions, babel-helper-module-transforms, babel-helper-split-export-declaration, babel-helper-wrap-function, babel-helpers, babel-plugin-bugfix-firefox-class-in-computed-class-key, babel-plugin-proposal-explicit-resource-management, babel-plugin-transform-block-scoping, babel-plugin-transform-destructuring, babel-plugin-transform-object-rest-spread, babel-plugin-transform-optional-chaining, babel-plugin-transform-parameters, babel-plugin-transform-private-property-in-object, babel-plugin-transform-react-jsx-self, babel-plugin-transform-typeof-symbol, babel-plugin-transform-typescript, babel-traverse
  • babel-plugin-proposal-partial-application, babel-types
  • babel-plugin-transform-class-properties, babel-preset-env

πŸƒβ€β™€οΈ Performance

  • babel-helpers, babel-preset-env, babel-runtime-corejs3
    • #16357 Performance: improve objectWithoutPropertiesLoose on V8 (@romgrk)

Committers: 6

Does any of this look wrong? Please let us know.

Commits

See the full diff on Github. The new version differs by more commits than we can show here.

↗️ @​jridgewell/gen-mapping (indirect, 0.3.3 β†’ 0.3.13) Β· Repo

Release Notes

0.3.5

What's Changed

Full Changelog: v0.3.4...v0.3.5

0.3.4

Full Changelog: v0.3.3...v0.3.4

Does any of this look wrong? Please let us know.

Sorry, we couldn’t find anything useful about this release.

↗️ @​jridgewell/sourcemap-codec (indirect, 1.4.15 β†’ 1.5.5) Β· Repo Β· Changelog

↗️ @​jridgewell/trace-mapping (indirect, 0.3.19 β†’ 0.3.31) Β· Repo

Release Notes

0.3.24

What's Changed

  • Add ignoreList (and x_google_ignoreList) support: 1027ce6

Full Changelog: v0.3.23...v0.3.24

0.3.23

Full Changelog: v0.3.22...v0.3.23

0.3.22

What's Changed

Full Changelog: v0.3.21...v0.3.22

0.3.21

What's Changed

Full Changelog: v0.3.20...v0.3.21

0.3.20

What's Changed

  • Fix handling of sectioned source maps missing 'names' array by @RandomByte in #29

New Contributors

Full Changelog: v0.3.19...v0.3.20

Does any of this look wrong? Please let us know.

Sorry, we couldn’t find anything useful about this release.

↗️ @​next/env (indirect, 13.5.6 β†’ 16.1.6) Β· Repo

Release Notes

Too many releases to show here. View the full release notes.

Commits

See the full diff on Github. The new version differs by 6 commits:

↗️ @​next/eslint-plugin-next (indirect, 13.5.6 β†’ 16.1.6)

Sorry, we couldn’t find anything useful about this release.

↗️ @​swc/helpers (indirect, 0.5.2 β†’ 0.5.15) Β· Repo

Sorry, we couldn’t find anything useful about this release.

↗️ @​typescript-eslint/parser (indirect, 6.5.0 β†’ 8.54.0) Β· Repo Β· Changelog

Release Notes

Too many releases to show here. View the full release notes.

Commits

See the full diff on Github. The new version differs by 18 commits:

↗️ @​typescript-eslint/scope-manager (indirect, 6.5.0 β†’ 8.54.0) Β· Repo Β· Changelog

Release Notes

Too many releases to show here. View the full release notes.

Commits

See the full diff on Github. The new version differs by 18 commits:

↗️ @​typescript-eslint/types (indirect, 6.5.0 β†’ 8.54.0) Β· Repo Β· Changelog

Release Notes

Too many releases to show here. View the full release notes.

Commits

See the full diff on Github. The new version differs by 18 commits:

↗️ @​typescript-eslint/typescript-estree (indirect, 6.5.0 β†’ 8.54.0) Β· Repo Β· Changelog

Release Notes

Too many releases to show here. View the full release notes.

Commits

See the full diff on Github. The new version differs by 18 commits:

↗️ @​typescript-eslint/visitor-keys (indirect, 6.5.0 β†’ 8.54.0) Β· Repo Β· Changelog

Release Notes

Too many releases to show here. View the full release notes.

Commits

See the full diff on Github. The new version differs by 18 commits:

↗️ array-includes (indirect, 3.1.6 β†’ 3.1.9) Β· Repo Β· Changelog

Release Notes

3.1.9 (from changelog)

Commits

  • [Deps] update call-bind, es-abstract, es-object-atoms, get-intrinsic, is-string 3b934ae
  • [Refactor] use call-bound and math-intrinsics directly 160ea60
  • [Dev Deps] update @es-shims/api, @ljharb/eslint-config, auto-changelog, hastrict-mode, tape 4e4c67d
  • [Tests] replace aud with npm audit 9c5ec1c
  • [Dev Deps] add missing peer dep 863d207

Does any of this look wrong? Please let us know.

Commits

See the full diff on Github. The new version differs by 15 commits:

↗️ array.prototype.flat (indirect, 1.3.1 β†’ 1.3.3) Β· Repo Β· Changelog

Release Notes

1.3.3 (from changelog)

Commits

  • [actions] split out node 10-20, and 20+ 1afcd57
  • [Deps] update call-bind, define-properties, es-abstract, es-shim-unscopables 152c437
  • [Dev Deps] update @es-shims/api, @ljharb/eslint-config, auto-changelog, function-bind npmignore, object-inspect, tape e39e33d
  • [Tests] replace aud with npm audit 6868723
  • [Dev Deps] add missing peer dep 800f3e3

1.3.2 (from changelog)

Commits

  • [Deps] update define-properties, es-abstract fb625eb
  • [Dev Deps] update @es-shims/api, @ljharb/eslint-config, aud, object-inspect, tape 1fde275

Does any of this look wrong? Please let us know.

Commits

See the full diff on Github. The new version differs by 9 commits:

↗️ array.prototype.flatmap (indirect, 1.3.1 β†’ 1.3.3) Β· Repo Β· Changelog

Release Notes

1.3.3 (from changelog)

Commits

  • [actions] split out node 10-20, and 20+ 8727281
  • [Tests] add test coverage 6e78327
  • [Deps] update call-bind, es-abstract e027dd1
  • [Dev Deps] update @es-shims/api, @ljharb/eslint-config, auto-changelog, object-inspect, tape 7322d84
  • [Dev Deps] update aud, npmignore, object-inspect, tape 958bf5c
  • [Deps] update call-bind, define-properties, es-abstract, es-shim-unscopables b3698fb
  • [Tests] replace aud with npm audit e0461ed
  • [Dev Deps] add missing peer dep e7160b5

1.3.2 (from changelog)

Commits

  • [Deps] update define-properties, es-abstract 1737863
  • [Dev Deps] update @es-shims/api, @ljharb/eslint-config, aud, object-inspect, tape 2337759

Does any of this look wrong? Please let us know.

Commits

See the full diff on Github. The new version differs by 12 commits:

↗️ available-typed-arrays (indirect, 1.0.5 β†’ 1.0.7) Β· Repo Β· Changelog

Release Notes

1.0.7 (from changelog)

Commits

  • [Refactor] use possible-typed-array-names ac86abf

1.0.6 (from changelog)

Commits

  • [actions] reuse common workflows 1850353
  • [meta] use npmignore to autogenerate an npmignore file 5c7de12
  • [patch] add types fcfb0ea
  • [actions] update codecov uploader d844945
  • [Dev Deps] update eslint, @ljharb/eslint-config, array.prototype.every, safe-publish-latest, tape a2be6f4
  • [Dev Deps] update eslint, @ljharb/eslint-config, aud, auto-changelog, tape b283a3e
  • [actions] update rebase action to use reusable workflow 0ad1f2d
  • [Dev Deps] update @ljharb/eslint-config, array.prototype.every, aud, tape cd36e81
  • [meta] simplify "exports" f696e5f
  • [Dev Deps] update aud, npmignore, tape bf20080

Does any of this look wrong? Please let us know.

Commits

See the full diff on Github. The new version differs by 13 commits:

↗️ axe-core (indirect, 4.7.2 β†’ 4.11.1) Β· Repo Β· Changelog

Release Notes

Too many releases to show here. View the full release notes.

Commits

See the full diff on Github. The new version differs by more commits than we can show here.

↗️ browserslist (indirect, 4.21.10 β†’ 4.28.1) Β· Repo Β· Changelog

Release Notes

Too many releases to show here. View the full release notes.

Commits

See the full diff on Github. The new version differs by more commits than we can show here.

↗️ call-bind (indirect, 1.0.2 β†’ 1.0.8) Β· Repo Β· Changelog

Release Notes

1.0.8 (from changelog)

Commits

  • [Refactor] extract out some helpers and avoid get-intrinsic usage 407fd5e
  • [Refactor] replace code with extracted call-bind-apply-helpers 81018fb
  • [Tests] use set-function-length/env 0fc311d
  • [actions] split out node 10-20, and 20+ 77a0cad
  • [Dev Deps] update @ljharb/eslint-config, auto-changelog, es-value-fixtures, gopd, object-inspect, tape a145d10
  • [Tests] replace aud with npm audit 30ca3dd
  • [Deps] update set-function-length 57c79a3
  • [Dev Deps] add missing peer dep 601cfa5

1.0.7 (from changelog)

Commits

  • [Refactor] use es-define-property 09b76a0
  • [Deps] update get-intrinsic, set-function-length ad5136d

1.0.6 (from changelog)

Commits

  • [Dev Deps] update aud, npmignore, tape d564d5c
  • [Deps] update get-intrinsic, set-function-length cfc2bdc
  • [Refactor] use es-errors, so things that only need those do not need get-intrinsic 64cd289
  • [meta] add missing engines.node 32a4038

1.0.5 (from changelog)

Commits

  • [Fix] throw an error on non-functions as early as possible f262408
  • [Deps] update set-function-length 3fff271

1.0.3 (from changelog)

Commits

  • [actions] reuse common workflows a994df6
  • [meta] use npmignore to autogenerate an npmignore file eef3ef2
  • [readme] flesh out content 1845ccf
  • [actions] use node/install instead of node/run; use codecov action 5b47d53
  • [Refactor] use set-function-length a0e165c
  • [Dev Deps] update @ljharb/eslint-config, aud, tape 9c50103
  • [meta] simplify "exports" 019c6d0
  • [Dev Deps] update eslint, @ljharb/eslint-config, aud, auto-changelog, safe-publish-latest, tape 23bd718
  • [actions] update codecov uploader 62552d7
  • [Dev Deps] update eslint, @ljharb/eslint-config, aud, auto-changelog, tape ec81665
  • [Dev Deps] update eslint, @ljharb/eslint-config, safe-publish-latest, tape 35d67fc
  • [Dev Deps] update eslint, @ljharb/eslint-config, aud, tape 0266d8d
  • [Dev Deps] update @ljharb/eslint-config, aud, tape 43a5b28
  • [Deps] update define-data-property, function-bind, get-intrinsic 780eb36
  • [Dev Deps] update aud, tape 90d50ad
  • [meta] use prepublishOnly script for npm 7+ 44c5433
  • [Deps] update get-intrinsic 86bfbfc
  • [Deps] update get-intrinsic 5c53354
  • [actions] update checkout action 4c393a8
  • [Deps] update get-intrinsic 4e70bde
  • [Deps] update get-intrinsic 55ae803

Does any of this look wrong? Please let us know.

Commits

See the full diff on Github. The new version differs by 43 commits:

↗️ caniuse-lite (indirect, 1.0.30001524 β†’ 1.0.30001766) Β· Repo Β· Changelog

↗️ define-properties (indirect, 1.2.0 β†’ 1.2.1) Β· Repo Β· Changelog

Release Notes

1.2.1 (from changelog)

Commits

  • [Refactor] use define-data-property e7782a7
  • [actions] use reusable rebase action cd249c3
  • [Dev Deps] update @ljharb/eslint-config, aud, tape 8205f97

Does any of this look wrong? Please let us know.

Commits

See the full diff on Github. The new version differs by 4 commits:

↗️ electron-to-chromium (indirect, 1.4.505 β†’ 1.5.279) Β· Repo Β· Changelog

Commits

See the full diff on Github. The new version differs by 2 commits:

↗️ es-abstract (indirect, 1.22.1 β†’ 1.24.1) Β· Repo Β· Changelog

Release Notes

Too many releases to show here. View the full release notes.

Commits

See the full diff on Github. The new version differs by more commits than we can show here.

↗️ es-set-tostringtag (indirect, 2.0.1 β†’ 2.1.0) Β· Repo Β· Changelog

Commits

See the full diff on Github. The new version differs by 22 commits:

↗️ es-to-primitive (indirect, 1.2.1 β†’ 1.3.0) Β· Repo Β· Changelog

Release Notes

1.3.0 (from changelog)

Commits

  • [actions] reuse common workflows bb72efc
  • [Tests] use es-value-fixtures a912f7b
  • [Tests] migrate tests to Github Actions 510baf0
  • [New] add types 69ba1fd
  • [meta] remove unused Makefile 4ea66e6
  • [actions] use node/install instead of node/run; use codecov action 3c31937
  • [meta] do not publish github action workflow files 389567e
  • [meta] use npmignore to autogenerate an npmignore file 9f3aa76
  • [actions] split out node 10-20, and 20+ c60d7d8
  • [Tests] run nyc on all tests; use tape runner 29cbb89
  • [meta] add auto-changelog ea744b2
  • [Dev Deps] update eslint, @ljharb/eslint-config, aud, function.prototype.name, has-symbols, object-inspect, object-is, tape e5c3c79
  • [actions] add automatic rebasing / merge commit blocking a5a6f00
  • [Dev Deps] update @ljharb/eslint-config, es-value-fixtures, function.prototype.name, npmignore, object-inspect, object-is, tape 7941fd5
  • [Dev Deps] update eslint, @ljharb/eslint-config, aud, es-value-fixtures, foreach, object-inspect, tape eb1c79c
  • [Dev Deps] update eslint, @ljharb/eslint-config, function.prototype.name, object-inspect, safe-publish-latest, tape 249b42f
  • [Dev Deps] update eslint, @ljharb/eslint-config, aud, function.prototype.name, object-inspect, object-is, tape d57d5e9
  • [actions] update codecov uploader 003b62c
  • [actions] add "Allow Edits" workflow 75ee990
  • [Dev Deps] update eslint, @ljharb/eslint-config, tape, object-is; add safe-publish-latest ba5da7b
  • [readme] remove travis badge 6f7aec7
  • [Dev Deps] update eslint, @ljharb/eslint-config, aud, object-inspect, tape 3291fd5
  • [Dev Deps] update eslint, @ljharb/eslint-config, function.prototype.name, has-symbols, object-inspect 53007f2
  • [actions] update checkout action 69640db
  • [Dev Deps] update eslint, @ljharb/eslint-config, object-is, tape; add aud c9d644e
  • [Tests] use for-each instead of foreach e9117bb
  • [readme] add github actions/codecov badges 53cd375
  • [Deps] update is-callable, is-date-object, is-symbol 8116c68
  • [Tests] fix test skipping for Symbol.toPrimitive e6268ef
  • [actions] switch Automatic Rebase workflow to pull_request_target event da41c40
  • [Deps] update is-callable, is-date-object 96fe13f
  • [Tests] replace aud with npm audit 0b53154
  • [meta] use prepublishOnly script for npm 7+ 9d7d485
  • [Deps] update is-callable 3c990b6
  • [Deps] update is-callable 9bcfff2
  • [Deps] update is-callable 1eb5478
  • [meta] only run aud on prod deps 1fcd896
  • [Deps] update is-symbol 7174a47

Does any of this look wrong? Please let us know.

Commits

See the full diff on Github. The new version differs by 39 commits:

↗️ escalade (indirect, 3.1.1 β†’ 3.2.0) Β· Repo

Release Notes

3.2.0

Patches

  • Declare separate ESM and CommonJS TypeScript definitions: a72e1c3
    Previously, only ESM definitions were shipped but were exported in a way that could cause tool/resolution ambiguity.

Chores

  • Update Node.js version matrix in CI suite: a8c6820

Full Changelog: v3.1.2...v3.2.0

3.1.2

Patches

Chores


Full Changelog: v3.1.1...v3.1.2

Does any of this look wrong? Please let us know.

Commits

See the full diff on Github. The new version differs by 7 commits:

↗️ eslint-module-utils (indirect, 2.8.0 β†’ 2.12.1) Β· Repo Β· Changelog

Release Notes

2.12.0 (from changelog)

Added

2.11.0 (from changelog)

Added

Fixed

2.10.0 (from changelog)

Added

2.9.0 (from changelog)

Added

Does any of this look wrong? Please let us know.

↗️ eslint-plugin-import (indirect, 2.28.1 β†’ 2.32.0) Β· Repo Β· Changelog

Release Notes

2.32.0

Added

Fixed

Changed

2.31.0

Added

Fixed

Changed

2.30.0

Added

Fixed

Changed

  • [Docs] no-extraneous-dependencies: Make glob pattern description more explicit (#2944, thanks @mulztob)
  • no-unused-modules: add console message to help debug #2866
  • [Refactor] ExportMap: make procedures static instead of monkeypatching exportmap (#2982, thanks @soryy708)
  • [Refactor] ExportMap: separate ExportMap instance from its builder logic (#2985, thanks @soryy708)
  • [Docs] order: Add a quick note on how unbound imports and --fix (#2640, thanks @minervabot)
  • [Tests] appveyor -> GHA (run tests on Windows in both pwsh and WSL + Ubuntu) (#2987, thanks @joeyguerra)
  • [actions] migrate OSX tests to GHA (ljharb#37, thanks @aks-)
  • [Refactor] exportMapBuilder: avoid hoisting (#2989, thanks @soryy708)
  • [Refactor] ExportMap: extract "builder" logic to separate files (#2991, thanks @soryy708)
  • [Docs] order: update the description of the pathGroupsExcludedImportTypes option (#3036, thanks @liby)
  • [readme] Clarify how to install the plugin (#2993, thanks @jwbth)

2.29.1

Full Changelog: v2.29.0...v2.29.1

2.29.0

Full Changelog: v2.28.1...v2.29.0

Does any of this look wrong? Please let us know.

Commits

See the full diff on Github. The new version differs by more commits than we can show here.

↗️ eslint-plugin-jsx-a11y (indirect, 6.7.1 β†’ 6.10.2) Β· Repo Β· Changelog

Release Notes

6.10.2 (from changelog)

Fixed

  • [patch] no-redundandant-roles: allow &lt;img src="*.svg" role="img" /&gt; #936

Commits

  • [meta] fix changelog URLs 0d01a1a
  • [Refactor] remove no-longer-needed es-iterator-helpers aa075bd
  • [Refactor] avoid spreading things that are already arrays d15d3ab
  • [Dev Deps] update @babel/cli, @babel/core, @babel/eslint-parser, @babel/plugin-transform-flow-strip-types, @babel/register 5dad7c4
  • [Tests] aria-role: Add valid test for &lt;svg role="img" /&gt; daba189
  • [Docs] label-has-associated-control: add line breaks for readability 0bc6378
  • [Tests] label-has-associated-control: add additional test cases 30d2318
  • [Tests] Add tests to reinforce required attributes for role="heading" d92446c

6.10.1 (from changelog)

Commits

  • [Fix] handle interactive/noninteractive changes from aria-query 4925ba8
  • [Docs] Use consistent spelling of 'screen reader' cb6788c
  • [Dev Deps] update @babel/cli, @babel/core, @babel/eslint-parser, @babel/plugin-transform-flow-strip-types, @babel/register, auto-changelog, eslint-plugin-import, tape 518a77e
  • [Deps] update es-iterator-helpers, string.prototype.includes eed03a3
  • [meta] package.json - Update jscodeshift & remove babel-jest 2ee940c
  • [Docs] Remove accidental whitespace in CONTRIBUTING.md a262131
  • [Deps] unpin aria-query e517937

6.10.0 (from changelog)

Fixed

  • [New] label-has-associated-control: add additional error message #1005
  • [Fix] label-has-associated-control: ignore undetermined label text #966

Commits

  • [Tests] switch from jest to tape a284cbf
  • [New] add eslint 9 support deac4fd
  • [New] add attributes setting a1ee7f8
  • [New] allow polymorphic linting to be restricted 6cd1a70
  • [Tests] remove duplicate tests 74d5dec
  • [Dev Deps] update @babel/cli, @babel/core, @babel/eslint-parser, @babel/plugin-transform-flow-strip-types 6eca235
  • [readme] remove deprecated travis ci badge; add github actions badge 0be7ea9
  • [Tests] use npm audit instead of aud 05a5e49
  • [Deps] update axobject-query 912e98c
  • [Deps] unpin axobject-query 75147aa
  • [Deps] update axe-core 27ff7cb
  • [readme] fix jsxA11y import name ce846e0
  • [readme] fix typo in shareable config section in readme cca288b

6.9.0

Added

  • add support for Flat Config 6b5f096
  • no-noninteractive-element-to-interactive-role: allow menuitemradio and menuitemcheckbox on <li> c0733f9

Fixed

  • img-redundant-alt: fixed multibyte character support #969
  • Revert "[Fix] isNonInteractiveElement: Upgrade aria-query to 5.3.0 and axobject-query to 3.2.1" 75d5dd7
  • ensure summary remains non-interactive 6a048da

Changed

  • [meta] fix changelog links #960
  • [Robustness] use safe-regex-test 4c7e781
  • [actions] update actions/checkout 51a1ca7
  • [Deps] pin aria-query and axobject-query, add ls-engines test to CI 32fd82c
  • [Deps] remove @babel/runtime 0a98ad8
  • [Deps] unpin axe-core b3559cf
  • [Deps] move object.entries to dev deps 1be7b70

Full Changelog: v6.8.0...v6.9.0

6.8.0 (from changelog)

Merged

  • Allow title attribute or aria-label attribute instead of accessible child in the "anchor-has-content" rule #727

Fixed

  • [Docs] aria-activedescendant-has-tabindex: align with changes from #708 #924
  • [Fix] control-has-associated-label: don't accept whitespace as an accessible label #918

Commits

  • [Tests] migrate helper parsers function from eslint-plugin-react ce4d57f
  • [Refactor] use es-iterator-helpers 52de824
  • [New] mouse-events-have-key-events: add hoverInHandlers/hoverOutHandlers config db64898
  • [New] add polymorphicPropName setting for polymorphic components fffb05b
  • [Fix] isNonInteractiveElement: Upgrade aria-query to 5.3.0 and axobject-query to 3.2.1 64bfea6
  • [Refactor] use hasown instead of has 9a8edde
  • [actions] update used actions 10c061a
  • [Dev Deps] update @babel/cli, @babel/core, @babel/eslint-parser, @babel/plugin-transform-flow-strip-types, @babel/register, aud, eslint-doc-generator, eslint-plugin-import, minimist 6d5022d
  • [Dev Deps] update @babel/cli, @babel/core, @babel/eslint-parser, @babel/register, eslint-doc-generator, eslint-plugin-import 4dc7f1e
  • [New] anchor-has-content: Allow title attribute OR aria-label attribute e6bfd5c
  • [patch] mouse-events-have-key-events: rport the attribute, not the node eadd70c
  • [Deps] update @babel/runtime, array-includes, array.prototype.flatmap, object.entries, object.fromentries 46ffbc3
  • [Deps] update @babel/runtime, axobject-query, jsx-ast-utils, semver 5999555
  • [Fix] pin aria-query and axe-core to fix failing tests on main 8d8f016
  • [patch] move semver from Deps to Dev Deps 4da13e7
  • [Deps] update ast-types-flow b755318
  • [Dev Deps] update eslint-plugin-import f1c976b
  • [Deps] unpin language-tags 3d1d26d
  • [Docs] no-static-element-interactions: tabIndex is written tabindex 1271153
  • [Deps] Upgrade ast-types-flow to mitigate Docker user namespacing problems f0d2ddb
  • [Dev Deps] pin jackspeak since 2.1.2+ depends on npm aliases, which kill the install process in npm < 6 0c278f4

Does any of this look wrong? Please let us know.

Commits

See the full diff on Github. The new version differs by more commits than we can show here.

↗️ eslint-plugin-react (indirect, 7.33.2 β†’ 7.37.5) Β· Repo Β· Changelog

Release Notes

Too many releases to show here. View the full release notes.

Commits

See the full diff on Github. The new version differs by more commits than we can show here.

↗️ eslint-plugin-react-hooks (indirect, 4.6.0 β†’ 7.0.1) Β· Repo Β· Changelog

↗️ for-each (indirect, 0.3.3 β†’ 0.3.5) Β· Repo Β· Changelog

Commits

See the full diff on Github. The new version differs by 19 commits:

↗️ function-bind (indirect, 1.1.1 β†’ 1.1.2) Β· Repo Β· Changelog

Commits

See the full diff on Github. The new version differs by 26 commits:

↗️ function.prototype.name (indirect, 1.1.6 β†’ 1.1.8) Β· Repo Β· Changelog

Release Notes

1.1.8 (from changelog)

Commits

  • [actions] split out node 10-20, and 20+ b5ea555
  • [Refactor] use call-bound directly f6a6c64

1.1.7 (from changelog)

Commits

  • [actions] split out node 10-20, and 20+ 47155b0
  • [Refactor] use hasown and is-callable directly, instead of es-abstract d5118d6
  • [Deps] update call-bind, define-properties, es-abstract cfa8b2e
  • [Dev Deps] update @es-shims/api, @ljharb/eslint-config, auto-changelog, npmignore, tape 2077d9a
  • [Tests] replace aud with npm audit 219e0a4
  • [Dev Deps] add missing peer dep 0b16b2b

Does any of this look wrong? Please let us know.

Commits

See the full diff on Github. The new version differs by 10 commits:

↗️ get-intrinsic (indirect, 1.2.1 β†’ 1.3.0) Β· Repo Β· Changelog

Release Notes

1.3.0 (from changelog)

Commits

  • [Dev Deps] update es-abstract, es-value-fixtures, for-each, object-inspect 9b61553
  • [Deps] update call-bind-apply-helpers, es-object-atoms, get-proto a341fee
  • [New] add Float16Array de22116

1.2.7 (from changelog)

Commits

  • [Refactor] use get-proto directly 00ab955
  • [Deps] update math-intrinsics c716cdd
  • [Dev Deps] update call-bound, es-abstract dc648a6

1.2.6 (from changelog)

Commits

  • [Refactor] use math-intrinsics 841be86
  • [Refactor] use es-object-atoms 42057df
  • [Deps] update call-bind-apply-helpers 45afa24
  • [Dev Deps] update call-bound 9cba9c6

1.2.5 (from changelog)

Commits

  • [actions] split out node 10-20, and 20+ 6e2b9dd
  • [Refactor] use dunder-proto and call-bind-apply-helpers instead of has-proto c095d17
  • [Refactor] use gopd 9841d5b
  • [Dev Deps] update @ljharb/eslint-config, auto-changelog, es-abstract, es-value-fixtures, gopd, mock-property, object-inspect, tape 2d07e01
  • [Deps] update gopd, has-proto, has-symbols, hasown 974d8bf
  • [Dev Deps] update call-bind, es-abstract, tape df9dde1
  • [Refactor] cache es-define-property as well 43ef543
  • [Deps] update has-proto, has-symbols, hasown ad4949d
  • [Tests] use call-bound directly ad5c406
  • [Deps] update has-proto, hasown 45414ca
  • [Tests] replace aud with npm audit 18d3509
  • [Deps] update es-define-property aadaa3b
  • [Dev Deps] add missing peer dep c296a16

1.2.4 (from changelog)

Commits

  • [Refactor] use all 7 <+ ES6 Errors from es-errors bcac811

1.2.3 (from changelog)

Commits

  • [Refactor] use es-errors, so things that only need those do not need get-intrinsic f11db9c
  • [Dev Deps] update aud, es-abstract, mock-property, npmignore b7ac7d1
  • [meta] simplify exports faa0cc6
  • [meta] add missing engines.node 774dd0b
  • [Dev Deps] update tape 5828e8e
  • [Robustness] use null objects for lookups eb9a11f
  • [meta] add sideEffects flag 89bcc7a

1.2.2 (from changelog)

Commits

  • [Dev Deps] update @ljharb/eslint-config, aud, call-bind, es-abstract, mock-property, object-inspect, tape f51bcf2
  • [Refactor] use hasown instead of has 18d14b7
  • [Deps] update function-bind 6e109c8

Does any of this look wrong? Please let us know.

Commits

See the full diff on Github. The new version differs by 41 commits:

↗️ globalthis (indirect, 1.0.3 β†’ 1.0.4) Β· Repo Β· Changelog

Commits

See the full diff on Github. The new version differs by 9 commits:

↗️ gopd (indirect, 1.0.1 β†’ 1.2.0) Β· Repo Β· Changelog

Release Notes

1.2.0 (from changelog)

Commits

  • [New] add gOPD entry point; remove get-intrinsic 5b61232

1.1.0 (from changelog)

Commits

  • [New] add types f585e39
  • [Dev Deps] update @ljharb/eslint-config, auto-changelog, tape 0b8e4fd
  • [Dev Deps] update aud, npmignore, tape 48378b2
  • [Dev Deps] update @ljharb/eslint-config, aud, tape 78099ee
  • [Tests] replace aud with npm audit 4e0d0ac
  • [meta] add missing engines.node 1443316
  • [Deps] update get-intrinsic eee5f51
  • [Deps] update get-intrinsic 550c378
  • [Dev Deps] add missing peer dep 8c2ecf8

Does any of this look wrong? Please let us know.

Commits

See the full diff on Github. The new version differs by 12 commits:

↗️ has-bigints (indirect, 1.0.2 β†’ 1.1.0) Β· Repo Β· Changelog

Release Notes

1.1.0 (from changelog)

Commits

  • [meta] use npmignore to autogenerate an npmignore file a411cea
  • [actions] split out node 10-20, and 20+ 4515878
  • [New] add types c888241
  • [actions] update rebase action to use reusable workflow 6f44338
  • [Dev Deps] update @ljharb/eslint-config, auto-changelog, npmignore, tape ffa1e4d
  • [Dev Deps] update aud, tape 0f5d096
  • [meta] add missing engines.node 3f73c71
  • [Tests] replace aud with npm audit b007efd
  • [Dev Deps] add missing peer dep 459c612

Does any of this look wrong? Please let us know.

Commits

See the full diff on Github. The new version differs by 10 commits:

↗️ has-property-descriptors (indirect, 1.0.0 β†’ 1.0.2) Β· Repo Β· Changelog

Commits

See the full diff on Github. The new version differs by 11 commits:

↗️ has-proto (indirect, 1.0.1 β†’ 1.2.0) Β· Repo Β· Changelog

Release Notes

1.2.0 (from changelog)

Commits

  • [Refactor] use dunder-proto instead of call-bind 6e5e76c
  • [actions] split out node 10-20, and 20+ 3b8e9e6
  • [Dev Deps] update @ljharb/tsconfig, gopd 57bcd00
  • [actions] skip npm ls in node < 10 ce3a4d7

1.1.0 (from changelog)

Commits

  • [New] add accessor and mutator endpoints 144f6a9
  • [types] use shared config 8b597cf
  • [Refactor] cache result at module level 88418bd
  • [Dev Deps] update @ljharb/eslint-config, auto-changelog, tape d246200
  • [Deps] update gopd, reflect.getprototypeof 6f72364
  • [Tests] add @arethetypeswrong/cli 8194e1a
  • [Tests] replace aud with npm audit fd7ad11
  • [Dev Deps] update @types/tape 2695808
  • [Dev Deps] add missing peer dep fa4b2f7

Does any of this look wrong? Please let us know.

Commits

See the full diff on Github. The new version differs by 22 commits:

↗️ has-symbols (indirect, 1.0.3 β†’ 1.1.0) Β· Repo Β· Changelog

Release Notes

1.1.0 (from changelog)

Commits

  • [actions] update workflows 548c0bf
  • [actions] further shard; update action deps bec56bb
  • [meta] use npmignore to autogenerate an npmignore file ac81032
  • [New] add types 6469cbf
  • [actions] update rebase action to use reusable workflow 9c9d4d0
  • [Dev Deps] update eslint, @ljharb/eslint-config, aud, tape adb5887
  • [Dev Deps] update @ljharb/eslint-config, aud, tape 13ec198
  • [Dev Deps] update auto-changelog, core-js, tape 941be52
  • [Tests] replace aud with npm audit 74f49e9
  • [Dev Deps] update npmignore 9c0ac04
  • [Dev Deps] add missing peer dep 52337a5

Does any of this look wrong? Please let us know.

Commits

See the full diff on Github. The new version differs by 12 commits:

↗️ has-tostringtag (indirect, 1.0.0 β†’ 1.0.2) Β· Repo Β· Changelog

Commits

See the full diff on Github. The new version differs by 14 commits:

↗️ is-bigint (indirect, 1.0.4 β†’ 1.1.0) Β· Repo Β· Changelog

Release Notes

1.1.0 (from changelog)

Commits

  • [actions] reuse common workflows 0e63a44
  • [meta] use npmignore to autogenerate an npmignore file 47584ee
  • [Tests] use for-each and es-value-fixtures f226864
  • [New] add types 78e2c47
  • [actions] split out node 10-20, and 20+ 4395a8d
  • [Dev Deps] update eslint, @ljharb/eslint-config, aud, auto-changelog, has-symbols, object-inspect, tape c188501
  • [Dev Deps] update eslint, @ljharb/eslint-config, object-inspect, safe-publish-latest, tape 5360d32
  • [actions] update rebase action to use reusable workflow d5c1775
  • [actions] update codecov uploader c7478c7
  • [Dev Deps] update @ljharb/eslint-config, auto-changelog, npmignore, object-inspect, tape 6fbce66
  • [meta] add missing engines.node 6f9ed42
  • [Tests] replace aud with npm audit 21846c3
  • [Dev Deps] remove unused has-symbols, add missing has-tostringtag b378d94
  • [Deps] update has-bigints f46c35b
  • [Dev Deps] add missing peer dep 2b9be16

Does any of this look wrong? Please let us know.

Commits

See the full diff on Github. The new version differs by 16 commits:

↗️ is-boolean-object (indirect, 1.1.2 β†’ 1.2.2) Β· Repo Β· Changelog

Release Notes

1.2.2 (from changelog)

Fixed

  • [Fix] do not be tricked by fake Booleans #25

Commits

  • [Dev Deps] update @arethetypeswrong/cli, @ljharb/tsconfig, @types/tape, core-js a27608b
  • [Deps] update call-bound b19953f

1.2.1 (from changelog)

Commits

  • [Refactor] use call-bound directly bb5aa26

1.2.0 (from changelog)

Commits

  • [actions] reuse common workflows 380fa25
  • [meta] use npmignore to autogenerate an npmignore file befa203
  • [actions] split out node 10-20, and 20+ ca31663
  • [New] add types 6d58609
  • [Dev Deps] update eslint, @ljharb/eslint-config, core-js, safe-publish-latest, tape 06cc67e
  • [actions] update codecov uploader 0722346
  • [Dev Deps] update eslint, @ljharb/eslint-config, aud, auto-changelog, tape 100acdf
  • [actions] update rebase action to use reusable workflow 26333ff
  • [Dev Deps] update eslint, @ljharb/eslint-config, aud, core-js, tape fde97ee
  • [Dev Deps] update @ljharb/eslint-config, auto-changelog, core-js, npmignore, tape f5ed3c8
  • [Deps] update call-bind, has-tostringtag 61912e2
  • [Tests] replace aud with npm audit c6a0db5
  • [meta] better eccheck command 3a59ec6
  • [Dev Deps] add missing peer dep c0e10db

Does any of this look wrong? Please let us know.

Commits

See the full diff on Github. The new version differs by 21 commits:

↗️ is-core-module (indirect, 2.13.0 β†’ 2.16.1) Β· Repo Β· Changelog

Release Notes

2.16.1 (from changelog)

Fixed

  • [Fix] node:sqlite is available in node ^22.13 #17

2.16.0 (from changelog)

Commits

  • [New] add node:sqlite 1ee94d2
  • [Dev Deps] update auto-changelog, tape aa84aa3

2.15.1 (from changelog)

Commits

  • [Tests] add process.getBuiltinModule tests 28c7791
  • [Fix] test/mock_loader is no longer exposed as of v22.7 68b08b0
  • [Tests] replace aud with npm audit 32f8060
  • [Dev Deps] update mock-property f7d3c8f
  • [Dev Deps] add missing peer dep eaee885

2.15.0 (from changelog)

Commits

2.14.0 (from changelog)

Commits

  • [Dev Deps] update @ljharb/eslint-config, aud, mock-property, npmignore, tape 0e43200
  • [meta] add missing engines.node 4ea3af8
  • [New] add test/mock_loader e9fbd29
  • [Deps] update hasown 57f1940

2.13.1 (from changelog)

Commits

  • [Refactor] use hasown instead of has 0e52096
  • [Dev Deps] update mock-property, tape 8736b35

Does any of this look wrong? Please let us know.

Commits

See the full diff on Github. The new version differs by 21 commits:

↗️ is-date-object (indirect, 1.0.5 β†’ 1.1.0) Β· Repo Β· Changelog

Release Notes

1.1.0 (from changelog)

Commits

  • [actions] reuse common workflows 35c5af0
  • [meta] use npmignore to autogenerate an npmignore file db6113c
  • [New] add types 4f1d9b3
  • [actions] split out node 10-20, and 20+ c9a1e4f
  • [Dev Deps] update eslint, @ljharb/eslint-config, core-js, safe-publish-latest, tape 35a2864
  • [Dev Deps] update eslint, @ljharb/eslint-config, aud, auto-changelog, tape b670bca
  • [actions] update rebase action to use reusable workflow d6bb341
  • [actions] update codecov uploader f850678
  • [Robustness] use call-bound 18ed326
  • [Dev Deps] update @ljharb/eslint-config, auto-changelog, core-js, npmignore, tape f0e792f
  • [meta] add exports field 342351f
  • [Tests] replace aud with npm audit 9b9b9cf
  • [Deps] update has-tostringtag 1bc37ab
  • [meta] add sideEffects flag 86d3a16
  • [Dev Deps] add missing peer dep fee274d

Does any of this look wrong? Please let us know.

Commits

See the full diff on Github. The new version differs by 16 commits:

↗️ is-generator-function (indirect, 1.0.10 β†’ 1.1.2) Β· Repo Β· Changelog

Release Notes

1.1.2 (from changelog)

Fixed

  • [Fix] fix broken logic #45

Commits

  • [Dev Deps] update @arethetypeswrong/cli, @ljharb/eslint-cig, @ljharb/tsconfig, @types/tape, for-each 9638da4
  • [Deps] update call-bound, get-proto d5e41c1

1.1.1 (from changelog)

Commits

  • [Refactor] use generator-function 5477ff1

1.1.0 (from changelog)

Commits

  • [actions] reuse common workflows 7301651
  • [actions] split out node 10-20, and 20+ 40f30a5
  • [meta] use npmignore to autogenerate an npmignore file ec843a4
  • [New] add types 6dd27c4
  • [actions] update codecov uploader 717f85e
  • [Dev Deps] update eslint, @ljharb/eslint-config, safe-publish-latest, tape 4280e62
  • [actions] update rebase action to use reusable workflow 895c2d0
  • [Tests] use for-each 3caee87
  • [Robustness] use call-bound 1eb55de
  • [Dev Deps] update eslint, @ljharb/eslint-config, aud, auto-changelog, object-inspect, tape 5bbd4cd
  • [Robustness] use safe-regex-test 5f8b992
  • [Dev Deps] update @ljharb/eslint-config, auto-changelog, npmignore, tape c730f4c
  • [Robustness] use get-proto 6dfff38
  • [Tests] replace aud with npm audit 725db70
  • [Deps] update has-tostringtag 5cc3c2d
  • [Dev Deps] add missing peer dep 869a507

Does any of this look wrong? Please let us know.

Commits

See the full diff on Github. The new version differs by 23 commits:

↗️ is-negative-zero (indirect, 2.0.2 β†’ 2.0.3) Β· Repo Β· Changelog

Release Notes

2.0.3 (from changelog)

Commits

  • add types e28f0d5
  • [meta] use npmignore to autogenerate an npmignore file f68ec13
  • [Dev Deps] update eslint, @ljharb/eslint-config, aud, auto-changelog, tape 70abff7
  • [actions] update rebase action to use reusable workflow 6e1356e
  • [Dev Deps] update @ljharb/eslint-config, aud, npmignore, tape c00d4ab
  • [meta] add sideEffects flag 9c45539

Does any of this look wrong? Please let us know.

Commits

See the full diff on Github. The new version differs by 7 commits:

↗️ is-number-object (indirect, 1.0.7 β†’ 1.1.1) Β· Repo Β· Changelog

Release Notes

1.1.1 (from changelog)

Commits

  • [Dev Deps] update @arethetypeswrong/cli, @ljharb/tsconfig, @types/tape 00d566d
  • [Refactor] use call-bound directly 073d5df
  • [Deps] update call-bind 36c84af

1.1.0 (from changelog)

Commits

  • [meta] use npmignore to autogenerate an npmignore file cb8423c
  • [New] add types 273e406
  • [actions] split out node 10-20, and 20+ 3da6267
  • [Robustness] use call-bind 834c098
  • [actions] update rebase action to use reusable workflow 84a8a9f
  • [Dev Deps] update @ljharb/eslint-config, auto-changelog, core-js, npmignore, tape 7275bca
  • [Dev Deps] update eslint, @ljharb/eslint-config, aud, core-js, tape 49a83aa
  • [Tests] replace aud with npm audit 061492b
  • [Refactor] avoid an expensive check, for null 08d29a8
  • [Deps] update has-tostringtag 4e2ad65
  • [Dev Deps] add missing peer dep 8228bfa

Does any of this look wrong? Please let us know.

Commits

See the full diff on Github. The new version differs by 16 commits:

↗️ is-regex (indirect, 1.1.4 β†’ 1.2.1) Β· Repo Β· Changelog

Release Notes

1.2.1 (from changelog)

Commits

  • [Refactor] use call-bound directly dbabfe3
  • [Deps] update call-bind, gopd d5343a0
  • [Dev Deps] update @arethetypeswrong/cli, @ljharb/tsconfig cc081eb

1.2.0 (from changelog)

Fixed

  • [Tests] allow tests to pass if zero traps are triggered #35

Commits

  • [actions] reuse common workflows be7bf6a
  • [New] add types 39066a4
  • [meta] use npmignore to autogenerate an npmignore file 8938588
  • [Refactor] reorganize code 2f76f26
  • [actions] split out node 10-20, and 20+ 8c9aedf
  • [meta] better eccheck command 6b39408
  • [Dev Deps] update eslint, @ljharb/eslint-config, safe-publish-latest, tape e38cf3c
  • [actions] update codecov uploader 487c75d
  • [Dev Deps] update eslint, @ljharb/eslint-config, aud, auto-changelog, core-js, foreach, tape 0d7da87
  • [Dev Deps] update eslint, @ljharb/eslint-config, aud, core-js, tape c1c1198
  • [actions] update rebase action to use reusable workflow 213646e
  • [Dev Deps] update @ljharb/eslint-config, auto-changelog, core-js, npmignore, tape 0a44e77
  • [Refactor] use hasown d939332
  • [Deps] update call-bind, has-tostringtag 46bfdc9
  • [Tests] use for-each instead of foreach 138b3f2
  • [Tests] replace aud with npm audit 37ed80a
  • [Deps] update gopd 6fd4097
  • [Dev Deps] update core-js 97c1c60
  • [Dev Deps] add missing peer dep 7329b8e

Does any of this look wrong? Please let us know.

Commits

See the full diff on Github. The new version differs by 25 commits:

↗️ is-string (indirect, 1.0.7 β†’ 1.1.1) Β· Repo Β· Changelog

Release Notes

1.1.1 (from changelog)

Commits

  • [Dev Deps] update @arethetypeswrong/cli, @ljharb/tsconfig, @types/tape c1f7ef7
  • [Refactor] use call-bound directly ba8a78f
  • [Deps] update call-bind 93c352f

1.1.0 (from changelog)

Commits

  • [actions] reuse common workflows 12aa75b
  • [meta] use npmignore to autogenerate an npmignore file 6401572
  • [actions] split out node 10-20, and 20+ 223540c
  • [New] add types 7e83d67
  • [Dev Deps] update eslint, @ljharb/eslint-config, core-js, safe-publish-latest, tape febd26e
  • [readme] add github actions/codecov badges; update URLs f6bf065
  • [Dev Deps] update eslint, @ljharb/eslint-config, aud, auto-changelog, core-js, tape 8afc37a
  • [Robustness] use call-bind ac86dd7
  • [actions] update rebase action to use reusable workflow 77058c8
  • [actions] update codecov uploader 4312be5
  • [Dev Deps] update eslint, @ljharb/eslint-config, aud, core-js, tape 98c3779
  • [Dev Deps] update @ljharb/eslint-config, auto-changelog, core-js, npmignore, tape 7d8e0e5
  • [Dev Deps] update eslint, @ljharb/eslint-config, core-js, safe-publish-latest, tape 3284ad1
  • [Tests] replace aud with npm audit 8cb7ea7
  • [Refactor] skip expensive check, for null 20fde50
  • [Deps] update has-tostringtag b67a78d
  • [meta] fix repo URL 1a2ee6b
  • [meta] better eccheck command 6913c75
  • [Dev Deps] add missing peer dep 8ac8551

Does any of this look wrong? Please let us know.

Commits

See the full diff on Github. The new version differs by 24 commits:

↗️ is-symbol (indirect, 1.0.4 β†’ 1.1.1) Β· Repo Β· Changelog

Release Notes

1.1.1 (from changelog)

Commits

  • [actions] re-add finishers 9b9d06f
  • [Deps] update call-bind, has-symbols, safe-regex-test 07f3647
  • [Refactor] use call-bound directly 799402d
  • [Dev Deps] update @arethetypeswrong/cli, @ljharb/tsconfig 4b8b2f9
  • [types] remove unneeded DT packages 398abaa

1.1.0 (from changelog)

Commits

  • [actions] reuse common workflows acf85f0
  • [meta] use npmignore to autogenerate an npmignore file 77c818e
  • [Tests] use for-each and es-value-fixtures 93dfed0
  • [New] add types ed6a057
  • [actions] split out node 10-20, and 20+ 7f81ccc
  • [Robustness] use call-bind and safe-regex-test dc7e142
  • [Dev Deps] update eslint, @ljharb/eslint-config, aud, auto-changelog, object-inspect, tape 70f87c2
  • [Dev Deps] update eslint, @ljharb/eslint-config, object-inspect, safe-publish-latest, tape 3f02ff4
  • [Dev Deps] update @ljharb/eslint-config, auto-changelog, has-tostringtag, npmignore, object-inspect, tape 9588872
  • [actions] update rebase action to use reusable workflow 59e2f68
  • [actions] update codecov uploader e4759f8
  • [Dev Deps] update eslint, auto-changelog, object-inspect, tape 33990c0
  • [Tests] use has-tostringtag for more robust Symbol.toStringTag detection d6154e1
  • [Tests] replace aud with npm audit 3215a60
  • [Refactor] avoid an expensive check, for primitives 59f1a42
  • [Deps] update has-symbols 06be1a9
  • [Dev Deps] add missing peer dep 799b0da

Does any of this look wrong? Please let us know.

Commits

See the full diff on Github. The new version differs by 24 commits:

↗️ is-typed-array (indirect, 1.1.12 β†’ 1.1.15) Β· Repo Β· Changelog

Release Notes

1.1.15 (from changelog)

Commits

1.1.14 (from changelog)

Commits

  • [types] use shared config eafa7fa
  • [actions] split out node 10-20, and 20+ cd6d5a3
  • [types] use which-typed-array’s TypedArray type; re-export it d7d9fcd
  • [Dev Deps] update @arethetypeswrong/cli, @ljharb/eslint-config, @ljharb/tsconfig, @types/node, @types/object-inspect, @types/tape, auto-changelog, object-inspect, tape 65afb42
  • [Dev Deps] update @types/node, has-tostringtag, tape 9e27ddd
  • [Tests] replace aud with npm audit ad4defe
  • [Tests] use @arethetypeswrong/cli ac4bcca
  • [Deps] update which-typed-array c298129
  • [Deps] update which-typed-array 744c29a
  • [Dev Deps] add missing peer dep 94d2f5a

1.1.13 (from changelog)

Commits

  • [patch] add types 8a8a679
  • [Dev Deps] update aud, has-tostringtag, npmignore, object-inspect, tape 8146b60
  • [actions] optimize finishers 34f875a
  • [Deps] update which-typed-array 19c974f
  • [meta] add sideEffects flag 0b68e5e

Does any of this look wrong? Please let us know.

Commits

See the full diff on Github. The new version differs by 20 commits:

↗️ json5 (indirect, 1.0.2 β†’ 2.2.3) Β· Repo Β· Changelog

Security Advisories 🚨

🚨 Prototype Pollution in JSON5 via Parse Method

The parse method of the JSON5 library before and including version 2.2.1 does not restrict parsing of keys named __proto__, allowing specially crafted strings to pollute the prototype of the resulting object.

This vulnerability pollutes the prototype of the object returned by JSON5.parse and not the global Object prototype, which is the commonly understood definition of Prototype Pollution. However, polluting the prototype of a single object can have significant security impact for an application if the object is later used in trusted operations.

Impact

This vulnerability could allow an attacker to set arbitrary and unexpected keys on the object returned from JSON5.parse. The actual impact will depend on how applications utilize the returned object and how they filter unwanted keys, but could include denial of service, cross-site scripting, elevation of privilege, and in extreme cases, remote code execution.

Mitigation

This vulnerability is patched in json5 v2.2.2 and later. A patch has also been backported for json5 v1 in versions v1.0.2 and later.

Details

Suppose a developer wants to allow users and admins to perform some risky operation, but they want to restrict what non-admins can do. To accomplish this, they accept a JSON blob from the user, parse it using JSON5.parse, confirm that the provided data does not set some sensitive keys, and then performs the risky operation using the validated data:

const JSON5 = require('json5');

const doSomethingDangerous = (props) => {
  if (props.isAdmin) {
    console.log('Doing dangerous thing as admin.');
  } else {
    console.log('Doing dangerous thing as user.');
  }
};

const secCheckKeysSet = (obj, searchKeys) => {
  let searchKeyFound = false;
  Object.keys(obj).forEach((key) => {
    if (searchKeys.indexOf(key) > -1) {
      searchKeyFound = true;
    }
  });
  return searchKeyFound;
};

const props = JSON5.parse('{"foo": "bar"}');
if (!secCheckKeysSet(props, ['isAdmin', 'isMod'])) {
  doSomethingDangerous(props); // "Doing dangerous thing as user."
} else {
  throw new Error('Forbidden...');
}

If the user attempts to set the isAdmin key, their request will be rejected:

const props = JSON5.parse('{"foo": "bar", "isAdmin": true}');
if (!secCheckKeysSet(props, ['isAdmin', 'isMod'])) {
  doSomethingDangerous(props);
} else {
  throw new Error('Forbidden...'); // Error: Forbidden...
}

However, users can instead set the __proto__ key to {"isAdmin": true}. JSON5 will parse this key and will set the isAdmin key on the prototype of the returned object, allowing the user to bypass the security check and run their request as an admin:

const props = JSON5.parse('{"foo": "bar", "__proto__": {"isAdmin": true}}');
if (!secCheckKeysSet(props, ['isAdmin', 'isMod'])) {
  doSomethingDangerous(props); // "Doing dangerous thing as admin."
} else {
  throw new Error('Forbidden...');
}
Release Notes

2.2.3

  • Fix: json5@2.2.3 is now the 'latest' release according to npm instead of v1.0.2. ([#299])

2.2.2

  • Fix: Properties with the name __proto__ are added to objects and arrays.
    (#199) This also fixes a prototype pollution vulnerability reported by
    Jonathan Gregson! (#295).

2.2.1

2.2.0

  • New: Accurate and documented TypeScript declarations are now included. There is no need to install @types/json5. ([#236], [#244])

2.1.3

v2.1.3 [code, diff]

  • Fix: An out of memory bug when parsing numbers has been fixed. ([#228], [#229])

2.1.2

  • Fix: Bump minimist to v1.2.5. ([#222])

2.1.1

  • New: package.json and package.json5 include a module property so
    bundlers like webpack, rollup and parcel can take advantage of the ES Module
    build. ([#208])
  • Fix: stringify outputs \0 as \\x00 when followed by a digit. ([#210])
  • Fix: Spelling mistakes have been fixed. ([#196])

Does any of this look wrong? Please let us know.

Commits

See the full diff on Github. The new version differs by more commits than we can show here.

↗️ node-releases (indirect, 2.0.13 β†’ 2.0.27) Β· Repo

Commits

See the full diff on Github. The new version differs by more commits than we can show here.

↗️ object-inspect (indirect, 1.12.3 β†’ 1.13.4) Β· Repo Β· Changelog

Release Notes

1.13.4 (from changelog)

Commits

  • [Fix] avoid being fooled by a Symbol.toStringTag fa5870d
  • [Tests] fix tests in node v6.0 - v6.4 2abfe1b
  • [Dev Deps] update es-value-fixtures, for-each, has-symbols 3edfb01

1.13.3 (from changelog)

Commits

  • [actions] split out node 10-20, and 20+ 44395a8
  • [Fix] quoteStyle: properly escape only the containing quotes 5137f8f
  • [Refactor] clean up quoteStyle code 450680c
  • [Tests] add quoteStyle escaping tests e997c59
  • [Dev Deps] update auto-changelog, es-value-fixtures, tape d5a469c
  • [Tests] replace aud with npm audit fb7815f
  • [Dev Deps] update mock-property 11c817b

1.13.2 (from changelog)

Commits

  • [readme] update badges 8a51e6b
  • [Dev Deps] update @ljharb/eslint-config, tape ef05f58
  • [Dev Deps] update error-cause, has-tostringtag, tape c0c6c26
  • [Fix] Don't throw when global is not defined d4d0965
  • [meta] add missing engines.node 17a352a
  • [Dev Deps] update globalthis 9c08884
  • [Dev Deps] update error-cause 6af352d
  • [Dev Deps] update npmignore 94e617d
  • [Dev Deps] update mock-property 2ac24d7
  • [Dev Deps] update tape 46125e5

1.13.1 (from changelog)

Commits

  • [Fix] in IE 8, global can !== window despite them being prototypes of each other 30d0859

1.13.0 (from changelog)

Commits

  • [New] add special handling for the global object 431bab2
  • [Dev Deps] update @ljharb/eslint-config, aud, tape fd4f619
  • [Dev Deps] update mock-property, tape b453f6c
  • [Dev Deps] update error-cause e8ffc57
  • [Dev Deps] update tape 054b8b9
  • [Dev Deps] temporarily remove aud due to breaking change in transitive deps 2476845
  • [Dev Deps] pin glob, since v10.3.8+ requires a broken jackspeak 383fa5e
  • [Dev Deps] pin jackspeak since 2.1.2+ depends on npm aliases, which kill the install process in npm < 6 68c244c

Does any of this look wrong? Please let us know.

Commits

See the full diff on Github. The new version differs by 34 commits:

↗️ object.assign (indirect, 4.1.4 β†’ 4.1.7) Β· Repo Β· Changelog

Release Notes

4.1.7 (from changelog)

  • [Deps] add missing es-object-atoms (#86)

4.1.6 (from changelog)

  • [Refactor] use call-bound directly; use es-object-atoms
  • [Deps] update call-bind, has-symbols
  • [Dev Deps] update @es-shims/api, @ljharb/eslint-config, hasown, mock-property, ses, tape
  • [actions] split out node 10-20, and 20+
  • [actions] remove redundant finisher
  • [Tests] replace aud with npm audit

4.1.5 (from changelog)

  • [meta] republish without testing HTML file (#85)
  • [Deps] update call-bind, define-properties
  • [Dev Deps] use hasown instead of has
  • [Dev Deps] update @es-shims/api, @ljharb/eslint-config, aud, npmignore, mock-property, tape
  • [actions] update rebase action

Does any of this look wrong? Please let us know.

Commits

See the full diff on Github. The new version differs by 32 commits:

↗️ object.entries (indirect, 1.1.7 β†’ 1.1.9) Β· Repo Β· Changelog

↗️ object.fromentries (indirect, 2.0.7 β†’ 2.0.8) Β· Repo Β· Changelog

Commits

See the full diff on Github. The new version differs by 5 commits:

↗️ object.values (indirect, 1.1.7 β†’ 1.2.1) Β· Repo Β· Changelog

↗️ picocolors (indirect, 1.0.0 β†’ 1.1.1) Β· Repo Β· Changelog

Release Notes

1.1.1

What's new?

  • Moved TypeScript declarations to a d.ts file #82
  • Reworked color detection algorithm to properly work with empty strings in NO_COLOR and FORCE_COLOR env variables #87
  • Eliminated require() call to make the package compatible with some tools #87

1.1.0

What's new?

  • Added bright color variants #55

1.0.1

What's new?

  • Updated color detection mechanism to work properly on Vercel Edge Runtime #64
  • Remove use of recursion to avoid possible stack overflow for very long inputs #56

Does any of this look wrong? Please let us know.

Commits

See the full diff on Github. The new version differs by 16 commits:

↗️ safe-regex-test (indirect, 1.0.0 β†’ 1.1.0) Β· Repo Β· Changelog

Release Notes

1.1.0 (from changelog)

Commits

  • [actions] split out node 10-20, and 20+ b4a46bb
  • [New] add types 5cb24eb
  • [Dev Deps] update @ljharb/eslint-config, auto-changelog, es-value-fixtures, object-inspect, tape e225ca0
  • [Refactor] use call-bound directly 9be3cd2
  • [Deps] update call-bind, is-regex 524b736
  • [Tests] replace aud with npm audit f3cd537
  • [Dev Deps] add missing peer dep 14da559

Does any of this look wrong? Please let us know.

Commits

See the full diff on Github. The new version differs by 24 commits:

↗️ side-channel (indirect, 1.0.4 β†’ 1.1.0) Β· Repo Β· Changelog

Release Notes

1.1.0 (from changelog)

Commits

  • [Refactor] extract implementations to side-channel-weakmap, side-channel-map, side-channel-list ada5955
  • [New] add channel.delete c01d2d3
  • [types] improve types 0c54356
  • [readme] add content be24868
  • [actions] split out node 10-20, and 20+ c4488e2
  • [types] use shared tsconfig 0e0d57c
  • [Dev Deps] update @ljharb/eslint-config, @ljharb/tsconfig, @types/get-intrinsic, @types/object-inspect, @types/tape, auto-changelog, tape fb4f622
  • [Deps] update call-bind, get-intrinsic, object-inspect b78336b
  • [Tests] replace aud with npm audit ee3ab46
  • [Dev Deps] add missing peer dep c03e21a

Does any of this look wrong? Please let us know.

Commits

See the full diff on Github. The new version differs by 33 commits:

↗️ string.prototype.matchall (indirect, 4.0.9 β†’ 4.0.12) Β· Repo Β· Changelog

Release Notes

4.0.12 (from changelog)

Commits

  • [actions] split out node 10-20, and 20+ ec6bcb6
  • [Deps] update call-bind, es-abstract, get-intrinsic, gopd, has-symbols, internal-slot, regexp.prototype.flags, side-channel 993a80c
  • [Dev Deps] update @es-shims/api, @ljharb/eslint-config, auto-changelog, mock-property, object-inspect, object.assign, tape 50e0c52
  • [Refactor] use call-bound directly 72c0fe1
  • [Tests] replace aud with npm audit 3a4bccb
  • [readme] remove dead badges ae4bdb2
  • [Dev Deps] add missing peer dep 14ceede

4.0.10 (from changelog)

Commits

  • [Refactor] use set-function-name a851cbb

Does any of this look wrong? Please let us know.

Commits

See the full diff on Github. The new version differs by 19 commits:

↗️ string.prototype.trim (indirect, 1.2.7 β†’ 1.2.10) Β· Repo Β· Changelog

Release Notes

1.2.10 (from changelog)

Commits

  • [actions] split out node 10-20, and 20+ 335d99a
  • [Refactor] use define-data-property and has-property-descriptors directly 2e0c2e9
  • [Dev Deps] update @es-shims/api, @ljharb/eslint-config, auto-changelog, tape 138d3db
  • [Deps] update call-bind, es-abstract 3a06731
  • [Refactor] use call-bound directly 9499206
  • [Tests] replace aud with npm audit c88a935
  • [Dev Deps] add missing dev dep 9667c7d
  • [Dev Deps] add missing peer dep 6417c72

1.2.8 (from changelog)

Commits

  • [Tests] add passing test cases 2ab172c
  • [Deps] update es-abstract 8c16598
  • [Dev Deps] update @es-shims/api, @ljharb/eslint-config, aud, tape 2b99fad
  • [Dev Deps] update @ljharb/eslint-config, @ljharb/eslint-config, aud, tape 97be2b5
  • [Deps] update define-properties, es-abstract 1fdc65f

Does any of this look wrong? Please let us know.

Commits

See the full diff on Github. The new version differs by 18 commits:

↗️ string.prototype.trimend (indirect, 1.0.6 β†’ 1.0.9) Β· Repo Β· Changelog

Release Notes

1.0.9 (from changelog)

Commits

  • [actions] split out node 10-20, and 20+ 7e5ffdc
  • [meta] sort package.json mildly 2f99c8b
  • [Dev Deps] update @es-shims/api, @ljharb/eslint-config, auto-changelog, tape 2774fe6
  • [Refactor] use call-bound directly 9e3bbec
  • [Tests] replace aud with npm audit cb9a462
  • [meta] add missing engines.node f46c829
  • [Deps] update call-bind e892c32
  • [Dev Deps] add missing peer dep e1a59da

1.0.7 (from changelog)

Commits

  • [Dev Deps] update @es-shims/api, @ljharb/eslint-config, aud, tape 1a10293
  • [Deps] update define-properties, es-abstract 6ba2e19

Does any of this look wrong? Please let us know.

Commits

See the full diff on Github. The new version differs by 15 commits:

↗️ string.prototype.trimstart (indirect, 1.0.6 β†’ 1.0.8) Β· Repo Β· Changelog

Release Notes

1.0.7 (from changelog)

Commits

  • [Dev Deps] update @es-shims/api, @ljharb/eslint-config, aud, tape 58e7aa6
  • [Deps] update define-properties, es-abstract 8d9a7bf

Does any of this look wrong? Please let us know.

Commits

See the full diff on Github. The new version differs by 9 commits:

↗️ styled-jsx (indirect, 5.1.1 β†’ 5.1.6) Β· Repo Β· Changelog

Release Notes

5.1.6

5.1.6 (2024-05-24)

Bug Fixes

5.1.5

5.1.5 (2024-05-24)

Bug Fixes

  • Correct context for declaration files (#847) (3e372f2)

5.1.4

5.1.4 (2024-05-24)

Bug Fixes

5.1.3

5.1.3 (2024-05-07)

Bug Fixes

5.1.2

5.1.2 (2023-01-25)

Bug Fixes

Does any of this look wrong? Please let us know.

Commits

See the full diff on Github. The new version differs by 7 commits:

↗️ tsconfig-paths (indirect, 3.14.2 β†’ 3.15.0) Β· Repo Β· Changelog

Commits

See the full diff on Github. The new version differs by 3 commits:

↗️ tslib (indirect, 2.6.2 β†’ 2.8.1) Β· Repo

Release Notes

2.8.1

What's Changed

Full Changelog: v2.8.0...v2.8.1

2.8.0

What's Changed

Full Changelog: v2.7.0...v2.8.0

2.7.0

What's Changed

  • Implement deterministic collapse of await in await using by @rbuckton in #262
  • Use global 'Iterator.prototype' for downlevel generators by @rbuckton in #267

Full Changelog: v2.6.3...v2.7.0

2.6.3

What's Changed

Full Changelog: v2.6.2...v2.6.3

Does any of this look wrong? Please let us know.

Commits

See the full diff on Github. The new version differs by 38 commits:

↗️ unbox-primitive (indirect, 1.0.2 β†’ 1.1.0) Β· Repo Β· Changelog

Release Notes

1.1.0 (from changelog)

Commits

  • [meta] use npmignore to autogenerate an npmignore file 348a5ad
  • [New] add types a324230
  • [Tests] use es-value-fixtures a321ae5
  • [actions] split out node 10-20, and 20+ 04a0e0d
  • [Dev Deps] update @ljharb/eslint-config, auto-changelog, npmignore, object-inspect, object-is, tape 7fff971
  • [actions] update rebase action 91d6807
  • [Deps] update call-bind, has-symbols, which-boxed-primitive f8b6597
  • [Dev Deps] update aud, object-inspect, tape b3362a1
  • [Refactor] use call-bound directly e29ff5f
  • [meta] add missing engines.node d3420bc
  • [Tests] replace aud with npm audit 5e6a6d0
  • [Deps] update which-boxed-primitive 0ff873d
  • [Dev Deps] update aud dd0e373
  • [Dev Deps] add missing peer dep 4f79b24

Does any of this look wrong? Please let us know.

Commits

See the full diff on Github. The new version differs by 15 commits:

↗️ update-browserslist-db (indirect, 1.0.11 β†’ 1.2.3) Β· Repo Β· Changelog

Release Notes

1.2.3

1.2.2

  • Fixed update on depth in pnpm config.

1.2.1

  • Fix ERR_PNPM_NO_PACKAGE_IN_DEPENDENCIES error on pnpm with old Browserslist.

1.2.0

  • Add Baseline data updating too.

1.1.4

  • Fixed package.json changes on pnpm update.

1.1.3

  • Fixed Bun support.

1.1.2

  • Use less aggressive message on browsers diff error.

1.1.1

  • Fixed types.

1.0.16

  • Fixed old Node.js support.

1.0.15

  • Fixed warning on missed browserslist in direct dependencies.

1.0.14

  • Another way to fix yarn and Hadoop CLI conflict (by Al Amin Ahamed).

Does any of this look wrong? Please let us know.

Commits

See the full diff on Github. The new version differs by more commits than we can show here.

↗️ which-boxed-primitive (indirect, 1.0.2 β†’ 1.1.1) Β· Repo Β· Changelog

Release Notes

1.1.1 (from changelog)

Commits

  • [Deps] update is-boolean-object, is-number-object, is-string, is-symbol 5266e0c
  • [Dev Deps] update @arethetypeswrong/cli, @ljharb/tsconfig, @types/tape a660339

1.1.0 (from changelog)

Commits

  • [actions] reuse common workflows 893df44
  • [meta] use npmignore to autogenerate an npmignore file bab1ff8
  • [Tests] use es-value-fixtures and for-each ecacfa0
  • [New] add types ab38e78
  • [actions] split out node 10-20, and 20+ 7ee9c3c
  • [Dev Deps] update eslint, @ljharb/eslint-config, aud, auto-changelog, object-inspect, safe-publish-latest, tape 142215a
  • [Dev Deps] update eslint, @ljharb/eslint-config, aud, auto-changelog, has-symbols, object-inspect, tape 3559371
  • [actions] update rebase action to use reusable workflow 928901a
  • [Deps] update is-bigint, is-boolean-object, is-number-object, is-string, is-symbol f7b14be
  • [Dev Deps] update @ljharb/eslint-config, auto-changelog, npmignore, object-inspect, tape 5296738
  • [Deps] update is-bigint, is-boolean-object, is-number-object, is-string, is-symbol caa6d1c
  • [meta] add missing engines.node ca40880
  • [Tests] replace aud with npm audit b0f4069
  • [Dev Deps] update aud 8d0e336
  • [Deps] update is-number-object eafcabf
  • [Dev Deps] add missing peer dep ec4dd52

Does any of this look wrong? Please let us know.

Commits

See the full diff on Github. The new version differs by 20 commits:

↗️ which-typed-array (indirect, 1.1.11 β†’ 1.1.20) Β· Repo Β· Changelog

Release Notes

1.1.20 (from changelog)

Commits

  • [types] add Float16Array to TypedArray b04301f
  • [Dev Deps] update @arethetypeswrong/cli, @ljharb/eslint-config, eslint, make-generator-function, npmignore 215b3a1
  • [readme] replace runkit CI badge with shields.io check-runs badge 32def83

1.1.19 (from changelog)

Commits

  • [Refactor] use get-proto, improve types e05d535
  • [Dev Deps] update @arethetypeswrong/cli, @ljharb/tsconfig, @types/tape 0dade9c
  • [Deps] update call-bound, for-each 490791a
  • [Tests] skip npm ls in older nodes f83aaca
  • [Dev Deps] update @ljharb/tsconfig 63c4795

1.1.18 (from changelog)

Commits

1.1.17 (from changelog)

Commits

  • [types] improve types 86bc612
  • [Dev Deps] update @arethetypeswrong/cli, @ljharb/tsconfig, @types/tape 2e9bed6
  • [Deps] update call-bind, gopd 34579df
  • [Refactor] use call-bound directly 2a2d84e

1.1.16 (from changelog)

Commits

  • [actions] split out node 10-20, and 20+ 8e289a9
  • [Dev Deps] update @arethetypeswrong/cli, @ljharb/eslint-config, @types/node, @types/tape, auto-changelog, tape 3d4a678
  • [Tests] replace aud with npm audit 6fbada9
  • [types] add an additional overload db5a791
  • [Dev Deps] remove an unused DT package 6bfff4c
  • [Dev Deps] add missing peer dep 05fd582

1.1.15 (from changelog)

Commits

  • [types] use a namespace; improve type f42bec3
  • [types] use shared config 464a9e3
  • [actions] remove redundant finisher; use reusable workflow d114ee8
  • [Dev Deps] update @types/node, tape, typescript; add @arethetypeswrong/cli 9cc63d8
  • [types] add a helpful hover description 29ccf8d
  • [Deps] update available-typed-arrays, call-bind, has-tostringtag 7ecfd8e

1.1.14 (from changelog)

Commits

  • [patch] add types 49c4d4c
  • [Dev Deps] update aud, npmignore, tape e5fab7b
  • [Deps] update available-typed-arrays, call-bind 97e2b44
  • [Deps] update has-tostringtag 1efa8bf

1.1.13 (from changelog)

Commits

  • [Refactor] avoid call-binding entirely when there is no method to bind 9ff452b

Does any of this look wrong? Please let us know.

Commits

See the full diff on Github. The new version differs by 43 commits:

πŸ†• @​babel/compat-data (added, 7.28.6)

πŸ†• @​babel/core (added, 7.28.6)

πŸ†• @​babel/generator (added, 7.28.6)

πŸ†• @​babel/helper-compilation-targets (added, 7.28.6)

πŸ†• @​babel/helper-globals (added, 7.28.0)

πŸ†• @​babel/helper-module-imports (added, 7.28.6)

πŸ†• @​babel/helper-module-transforms (added, 7.28.6)

πŸ†• @​babel/helper-string-parser (added, 7.27.1)

πŸ†• @​babel/helper-validator-option (added, 7.27.1)

πŸ†• @​babel/helpers (added, 7.28.6)

πŸ†• @​babel/parser (added, 7.28.6)

πŸ†• @​babel/template (added, 7.28.6)

πŸ†• @​babel/traverse (added, 7.28.6)

πŸ†• @​babel/types (added, 7.28.6)

πŸ†• @​emnapi/runtime (added, 1.8.1)

πŸ†• @​img/colour (added, 1.0.0)

πŸ†• @​img/sharp-darwin-arm64 (added, 0.34.5)

πŸ†• @​img/sharp-darwin-x64 (added, 0.34.5)

πŸ†• @​img/sharp-libvips-darwin-arm64 (added, 1.2.4)

πŸ†• @​img/sharp-libvips-darwin-x64 (added, 1.2.4)

πŸ†• @​img/sharp-libvips-linux-arm (added, 1.2.4)

πŸ†• @​img/sharp-libvips-linux-arm64 (added, 1.2.4)

πŸ†• @​img/sharp-libvips-linux-ppc64 (added, 1.2.4)

πŸ†• @​img/sharp-libvips-linux-riscv64 (added, 1.2.4)

πŸ†• @​img/sharp-libvips-linux-s390x (added, 1.2.4)

πŸ†• @​img/sharp-libvips-linux-x64 (added, 1.2.4)

πŸ†• @​img/sharp-libvips-linuxmusl-arm64 (added, 1.2.4)

πŸ†• @​img/sharp-libvips-linuxmusl-x64 (added, 1.2.4)

πŸ†• @​img/sharp-linux-arm (added, 0.34.5)

πŸ†• @​img/sharp-linux-arm64 (added, 0.34.5)

πŸ†• @​img/sharp-linux-ppc64 (added, 0.34.5)

πŸ†• @​img/sharp-linux-riscv64 (added, 0.34.5)

πŸ†• @​img/sharp-linux-s390x (added, 0.34.5)

πŸ†• @​img/sharp-linux-x64 (added, 0.34.5)

πŸ†• @​img/sharp-linuxmusl-arm64 (added, 0.34.5)

πŸ†• @​img/sharp-linuxmusl-x64 (added, 0.34.5)

πŸ†• @​img/sharp-wasm32 (added, 0.34.5)

πŸ†• @​img/sharp-win32-arm64 (added, 0.34.5)

πŸ†• @​img/sharp-win32-ia32 (added, 0.34.5)

πŸ†• @​img/sharp-win32-x64 (added, 0.34.5)

πŸ†• @​jridgewell/remapping (added, 2.3.5)

πŸ†• @​rtsao/scc (added, 1.1.0)

πŸ†• @​typescript-eslint/project-service (added, 8.54.0)

πŸ†• @​typescript-eslint/tsconfig-utils (added, 8.54.0)

πŸ†• array.prototype.findlast (added, 1.2.5)

πŸ†• async-function (added, 1.0.0)

πŸ†• baseline-browser-mapping (added, 2.9.19)

πŸ†• call-bind-apply-helpers (added, 1.0.2)

πŸ†• call-bound (added, 1.0.4)

πŸ†• convert-source-map (added, 2.0.0)

πŸ†• data-view-buffer (added, 1.0.2)

πŸ†• data-view-byte-length (added, 1.0.2)

πŸ†• data-view-byte-offset (added, 1.0.1)

πŸ†• define-data-property (added, 1.1.4)

πŸ†• detect-libc (added, 2.1.2)

πŸ†• dunder-proto (added, 1.0.1)

πŸ†• es-define-property (added, 1.0.1)

πŸ†• es-errors (added, 1.3.0)

πŸ†• es-object-atoms (added, 1.1.1)

πŸ†• fdir (added, 6.5.0)

πŸ†• generator-function (added, 2.0.1)

πŸ†• gensync (added, 1.0.0-beta.2)

πŸ†• get-proto (added, 1.0.1)

πŸ†• hasown (added, 2.0.2)

πŸ†• hermes-estree (added, 0.25.1)

πŸ†• hermes-parser (added, 0.25.1)

πŸ†• is-data-view (added, 1.0.2)

πŸ†• jsesc (added, 3.1.0)

πŸ†• math-intrinsics (added, 1.1.0)

πŸ†• own-keys (added, 1.0.1)

πŸ†• possible-typed-array-names (added, 1.1.0)

πŸ†• safe-push-apply (added, 1.0.0)

πŸ†• set-function-length (added, 1.2.2)

πŸ†• set-function-name (added, 2.0.2)

πŸ†• set-proto (added, 1.0.0)

πŸ†• sharp (added, 0.34.5)

πŸ†• side-channel-list (added, 1.0.0)

πŸ†• side-channel-map (added, 1.0.1)

πŸ†• side-channel-weakmap (added, 1.0.2)

πŸ†• stop-iteration-iterator (added, 1.1.0)

πŸ†• string.prototype.includes (added, 2.0.1)

πŸ†• string.prototype.repeat (added, 1.0.0)

πŸ†• tinyglobby (added, 0.2.15)

πŸ†• typescript-eslint (added, 8.54.0)

πŸ†• zod (added, 4.3.6)

πŸ†• zod-validation-error (added, 4.0.2)

πŸ—‘οΈ @​babel/highlight (removed)

πŸ—‘οΈ @​jridgewell/set-array (removed)

πŸ—‘οΈ @​next/swc-win32-ia32-msvc (removed)

πŸ—‘οΈ @​rushstack/eslint-patch (removed)

πŸ—‘οΈ asynciterator.prototype (removed)

πŸ—‘οΈ busboy (removed)

πŸ—‘οΈ dequal (removed)

πŸ—‘οΈ glob-to-regexp (removed)

πŸ—‘οΈ has (removed)

πŸ—‘οΈ object.hasown (removed)

πŸ—‘οΈ streamsearch (removed)

πŸ—‘οΈ watchpack (removed)