fix(deps): patch next-mdx-remote and opentelemetry CVEs#4557
Conversation
- bump next-mdx-remote 5.0.0 → 6.0.0 (GHSA-g4xw-jxrg-5f6m / CVE-2026-0969, arbitrary code execution in MDX serialize) - bump @opentelemetry/sdk-node and exporter-trace-otlp-http 0.200.0 → 0.217.0 (GHSA-q7rr-3cgh-j5r3 / CVE-2026-44902, Prometheus exporter DoS) - align @opentelemetry/sdk-trace-base, sdk-trace-node, resources to ^2.7.0 to keep all @opentelemetry/* packages on a single core@2.7.1 instance
|
The latest updates on your projects. Learn more about Vercel for GitHub.
|
PR SummaryMedium Risk Overview Bumps the app’s OpenTelemetry dependencies (notably Reviewed by Cursor Bugbot for commit e7e6450. Configure here. |
Greptile SummaryThis PR patches two high-severity CVEs by bumping
Confidence Score: 4/5Safe to merge once the smoke-test confirms blog rendering and OTel span export still work; no application logic was changed. The lockfile correctly unifies all @opentelemetry/core instances to 2.7.1 and tsc passes. The main open item is that smoke testing is still pending per the PR description, and the import-in-the-middle 1→3 jump is large enough that silently broken auto-instrumentation might not surface until a real OTel trace is exercised in dev or staging. bun.lock — the import-in-the-middle and require-in-the-middle major-version changes; apps/sim/instrumentation-node.ts should be exercised in dev to confirm span export still works after the OTel upgrade. Important Files Changed
Flowchart%%{init: {'theme': 'neutral'}}%%
flowchart TD
subgraph MDX["next-mdx-remote (CVE-2026-0969)"]
NMR5["next-mdx-remote@5.0.0"]
NMR6["next-mdx-remote@6.0.0\nblockJS: true default"]
NMR5 -- "5 to 6" --> NMR6
end
subgraph OTEL["@opentelemetry/*"]
OTEL1["sdk-node + exporter-trace-otlp-http\n0.200.0 to 0.217.0"]
CORE1["@opentelemetry/core 2.0.0 to 2.7.1"]
PROTO["protobufjs 7.x to 8.x"]
IITM["import-in-the-middle 1.x to 3.x"]
OTEL1 --> CORE1
OTEL1 --> PROTO
OTEL1 --> IITM
end
subgraph USAGE["App code (unchanged)"]
INSTR["instrumentation-node.ts"]
REG["lib/blog/registry.ts compileMDX"]
end
NMR6 --> REG
OTEL1 --> INSTR
|
Summary
next-mdx-remote5.0.0 → 6.0.0 — resolves GHSA-g4xw-jxrg-5f6m / CVE-2026-0969 (arbitrary code execution in MDX serialize; high, CVSS 8.8). v6 introducesblockJS: truedefault; audited all 9 blog posts and confirmed no MDX uses raw JS expressions outside fenced code blocks@opentelemetry/sdk-nodeand@opentelemetry/exporter-trace-otlp-http0.200.0 → 0.217.0 — resolves GHSA-q7rr-3cgh-j5r3 / CVE-2026-44902 (Prometheus exporter DoS via malformed URL; high, CVSS 7.5). Our process uses the OTLP HTTP trace exporter and does not bind the Prometheus port, so actual exposure was already nil — patch closes the dependabot alert@opentelemetry/sdk-trace-base,sdk-trace-node,resourcesto^2.7.0so all@opentelemetry/*packages resolve to a single@opentelemetry/core@2.7.1instance (prevents silent breakage from mixedcoreversions)Type of Change
Testing
Tested manually —
tsc --noEmitpasses, lockfile shows a single top-level@opentelemetry/core@2.7.1andnext-mdx-remote@6.0.0. Will smoke-test blog rendering and OTel span export in dev before merge.Note: dependabot #112 (mermaid) deliberately not included — mermaid@11.15.0 was blocked by the repo's 3-day
minimum-release-agepolicy. Will ship in a follow-up once it ages in.Checklist