Changelog

Subscribe to feed
  • One-click install Netlify MCP on Cursor

    You can now install the Netlify MCP on Cursor with a single click.

    Install MCP Server

    Check out our docs on the Netlify MCP server here.

    Permalink to One-click install Netlify MCP on Cursor
  • Connect agents to the Netlify MCP Server

    The Netlify MCP Server enables AI agents to deploy applications directly from your editor. Built on the Model Context Protocol, agents can now complete the full development cycle from code to production.

    Permalink to Connect agents to the Netlify MCP Server
  • Vite plugin is now available

    Netlify is now the official deployment partner for Vite, plus introducing our new Vite plugin. Access the Netlify platform directly into your local dev environment.

    Permalink to Vite plugin is now available
  • Angular 20 support

    Angular 20 is now fully supported on Netlify with zero configuration required.

    What’s new

    • Full Angular 20 compatibility: Deploy Angular 20 projects with all the latest features including stable signals APIs, zoneless change detection in developer preview, and incremental hydration.

    • Updated Angular template: We’ve refreshed our Angular starter template to showcase Angular 20’s capabilities, including the new control flow syntax and simplified component naming conventions.

    • Optimized SSR support: Angular 20’s stable incremental hydration and route-level rendering modes work with Netlify’s edge network for faster, more efficient server-side rendering.

    How to get started

    Add your existing Angular 20 project by connecting your Git repository–or deploy our template–no configuration changes needed. For new projects, try our updated template with Angular 20’s latest features.

    If you’re planning to upgrade from version 18 or earlier, check out our guidance on the Angular runtime.

    Permalink to Angular 20 support
  • Netlify CLI 21.4.1 UI and workflow enhancements

    CLI updates

    Netlify CLI 21.4.1 has a cleaner look, simplified workflows, and a new command.

    Install the latest version:

    npm install netlify-cli -g
    # or
    yarn global add netlify-cli

    Onboard to Netlify projects with netlify clone command

    Pull an existing Netlify project locally from its repo with one command:

    netlify clone <repository-url>

    Clones the repo and links it to the right Netlify site–ideal for onboarding or switching projects.

    Builds are included with netlify deploy

    The deploy command now runs a build step by default, eliminating separate build commands.

    Instead of netlify build && netlify deploy or netlify deploy --build, simply run:

    netlify deploy

    To deploy without building, use netlify deploy --no-build.

    Smarter manual setup

    netlify init now auto-detects your framework and suggests the right build settings. It’ll even help you create a netlify.toml if you don’t have one.

    Better updates and onboarding

    Additional improvements include:

    • Better update notifications with links to release notes
    • Improved onboarding guidance with clearer next steps and resource links
    • Reorganized help command with better documentation references
    Permalink to Netlify CLI 21.4.1 UI and workflow enhancements
  • Security Update: Next.js sites on Netlify not vulnerable to CVE-2025-32421

    The Next.js team recently disclosed CVE-2025-32421, a low-severity vulnerability allowing for CDN cache poisoning in some scenarios.

    The engineering team at Netlify has confirmed that all Next.js sites on Netlify are not vulnerable. The vulnerability requires use of a CDN that may cache responses without explicit Cache-Control headers, but Netlify’s CDN never does so.

    As a general security precaution, we recommend upgrading to the latest versions of the Next.js framework and allowing automatic updates of the OpenNext Netlify Next.js adapter.

    Permalink to Security Update: Next.js sites on Netlify not vulnerable to CVE-2025-32421
  • Introducing the Netlify Cache API

    Discover the new Netlify Cache API beta. Built on web standards, it lets developers cache fetch requests in serverless and edge functions. Works seamlessly with any framework (or without one) for faster, more resilient apps.

    Permalink to Introducing the Netlify Cache API
  • Build Plugins: End of support for Node.js 14 + Node.js 16

    The following versions of Node.js have reached their official end of life. Node.js v14 on February 16, 2023 Node.js v16 on August 9, 2023 It is also worth noting that the following version is also about to reach its end of life date. Node.js v18 on…

    Learn more about Build Plugins: End of support for Node.js 14 + Node.js 16 Learn More
  • Security Update: React Router and Remix Vulnerabilities

    We are aware of recently disclosed vulnerabilities affecting React Router and Remix:

    1. CVE 2025-31137 (React Router 7 and Remix): Spoof request path allowing certain access control bypasses
    2. CVE-2025-43864 (React Router 7 only): Cache poisoning leading to unusable responses
    3. CVE-2025-43865 (React Router 7 only): Cache poisoning with arbitrary data

    Impact on Netlify sites:

    • CVE 2025-31137: Sites on Netlify are not vulnerable, because the Netlify CDN cache varies on the query string by default, and Remix and React Router sites on Netlify do not use the impacted Express package.
    • CVE-2025-43864: Sites on Netlify using React Router 7.2.0 to 7.5.1 were vulnerable until 04/27 3:00 UTC. However, exploitation requires all of the following conditions for a given URL to be poisonable:
      • The site must not be using React Router’s SPA mode.
      • The page or loader must be explicitly setting caching headers.
      • A malicious request would need to be the first request to reach the cache (such as immediately after a deploy or cache invalidation).
    • CVE-2025-43865: Sites on Netlify using React Router 7.0.0 to 7.5.1 were vulnerable until 04/27 3:00 UTC. However, exploitation requires all of the following conditions for a given URL to be poisonable:
      • The page or loader must be explicitly setting caching headers.
      • A malicious request would need to be the first request to reach the cache (such as immediately after a deploy or cache invalidation).

    We strongly recommend upgrading to the latest versions of React Router (7.5.2).

    Given these specific requirements, the number of vulnerable Netlify sites is low. However, out of an abundance of caution, our engineering team is actively rolling out a mitigation to further protect against these vulnerabilities. We will continue to monitor the situation and will provide updates as our work progresses.

    Update: As of 2025-04-27 3:00 AM UTC, a mitigation has been rolled out to the Netlify CDN for all vulnerable sites.

    Permalink to Security Update: React Router and Remix Vulnerabilities
Previous page Next page