Skip to content
Closed
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
6 changes: 6 additions & 0 deletions pages/notices/upgrade-16.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -20,6 +20,12 @@ import { Steps, Callout } from 'nextra/components'

This page outlines important changes related to Upgrade 16 for chain operators and users. The upgrade proposal includes modifications to the OP Stack that will set the Superchain up for continued success through the remainder of 2025.

<Callout type="info">
The Upgrade 16 protocol upgrade on the **Sepolia** Superchain will be executed on **Wed, Jul 09, 2025**, and the **Mainnet** Superchain will be activated on **Thu, Jul 24, 2025**.
The upgrade will be executed on the following chains: `OP`, `Soneium`, `Ink`, `Base`, `Unichain`, `Mode`, `Zora`, `Arena Z`, `Swell`, `World Chain`, and `Metal`.
Execution times may vary depending on the current state of each chain.
</Callout>

## What's included in Upgrade 16

Upgrade 16 contains these main changes:
Expand Down
6 changes: 3 additions & 3 deletions pnpm-lock.yaml

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Critical Vulnerability Finding on line 0

More Details

Vulnerabilities [next:14.2.21]

Name Severity Source Fixed version CVSS score CVSS exploitability score Has public exploit Has CISA KEV exploit
CVE-2025-29927 Critical GHSA-f82v-jwr5-mffw 14.2.25 9.1 3.9 true false
CVE-2025-32421 Low GHSA-qpjv-v59x-3qc4 14.2.24 3.7 2.2 false false
CVE-2025-48068 Low GHSA-3h52-269p-cp9r 14.2.30 2.3 - false false

To ignore this finding as an exception, reply to this conversation with #wiz_ignore reason

If you'd like to ignore this finding in all future scans, add an exception in the .wiz file (learn more) or create an Ignore Rule (learn more).

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Critical Vulnerability Finding on line 0

More Details

Vulnerabilities [elliptic:6.5.4]

Name Severity Source Fixed version CVSS score CVSS exploitability score Has public exploit Has CISA KEV exploit
CVE-2024-42459 Low GHSA-f7q4-pwc6-w24p 6.5.7 5.3 3.9 false false
CVE-2024-42460 Low GHSA-977x-g7h5-7qgw 6.5.7 5.3 3.9 false false
CVE-2024-42461 Low GHSA-49q7-c7j4-3p7m 6.5.7 9.1 3.9 false false
CVE-2024-48948 Low GHSA-fc9h-whq2-v747 6.6.0 4.8 2.2 false false
CVE-2024-48949 Low GHSA-434g-2637-qmqr 6.5.6 9.1 3.9 false false
GHSA-vjh7-7g9h-fjfh Critical GHSA-vjh7-7g9h-fjfh 6.6.1 9.0 - false false

To ignore this finding as an exception, reply to this conversation with #wiz_ignore reason

If you'd like to ignore this finding in all future scans, add an exception in the .wiz file (learn more) or create an Ignore Rule (learn more).

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

Loading