Vulnerability

Vulnerability in React Server Components and Next.js

React released security updates for a vulnerability in React Server Components The vulnerability, registered as CVE-2025-55182, also affects Next.js with App Router

Clip path group@2x

T-Update

Information about vulnerabilities

This live blog contains information about a vulnerability in React Server Components and Next.js. React has released security updates to address this vulnerability.

This blog is last updated on 5 December 2025

Update on 5 December 2025

Public proof-of-concept code for CVE-2025-55182 is now available, increasing the risk of exploitation.


Update on 4 December 2025

Critical Vulnerability in React Server Components and Next.js

React has released updates for a vulnerability in React Server Components. The vulnerability afffects React versions 19.0, 19.1.0, 19.1.1, and 19.2.0 of:

  • react-server-dom-webpack
  • react-server-dom-parcel
  • react-server-dom-turbopack

The vulnerability also affects Next.js with App Router. The vulnerability exists in Next.js versions 14.3.0-canary, 15.x, and 16.x and is fixed in the following patched versions: 14.3.0-canary.88, 15.0.5, 15.1.9, 15.2.6, 15.3.6, 15.4.8, 15.5.7, and 16.0.7.

The following CVE applies

Active Exploitation

There does not appear to be an active exploit or PoC for this vulnerability at this time. However, it is possible to verify the presence of this vulnerability using a crafted HTTP request.

Customized cyber security

Background

React has fixed a critical vulnerability in React Server Components. The vulnerability is present in React versions 19.0, 19.1.0, 19.1.1, and 19.2.0. The vulnerability also affects Next.js with App Router. The vulnerability is present in Next.js versions 14.3.0-canary, 15.x, and 16.x and is fixed in the following patched versions: 14.3.0-canary.88, 15.0.5, 15.1.9, 15.2.6, 15.3.6, 15.4.8, 15.5.7, and 16.0.7.

Risk

An unauthenticated attacker could send a malicious HTTP request to any Server Function endpoint, which, when processed by React, could lead to remote code execution on the server. However, even if a Server Function endpoint is not implemented, exploitation could still be possible via React Server Components. This flaw could allow attackers to remotely execute arbitrary code, severely compromising the integrity of affected applications.

Advice

React has released security updates to address the vulnerability. It is advised to install these updates as soon as possible. See the React instructions for more information.

If you are using the packages mentioned above, upgrade immediately. This vulnerability has been fixed in versions 19.0.1, 19.1.2, and 19.2.1. If your application's React code does not use a server, your application is not vulnerable to this vulnerability. Also, if your application does not use a framework, bundler, or bundler plugin that supports React Server Components, your application is not affected.

The following React frameworks and bundlers are affected:

  • Next
  • ReactRouter
  • Waku
  • @parcel/rsc
  • @vitejs/plugin-rsc
  • rwsdk

The vulnerability also affects Next.js with App Router. The vulnerability exists in Next.js versions 14.3.0-canary, 15.x, and 16.x and is fixed in the following patched versions: 14.3.0-canary.88, 15.0.5, 15.1.9, 15.2.6, 15.3.6, 15.4.8, 15.5.7, and 16.0.7.

Ellipse 6

Sign up to receive T-Updates

Receive the latest vulnerabilities in your email every Wednesday

More than 1,000 organisations have already joined us.

Tesorion gebruikt jouw gegevens voor het versturen van de gevraagde informatie. Daarnaast worden je gegevens mogelijk gebruikt voor commerciële opvolging. Je kunt je op elk gewenst moment hiervoor afmelden via de link in de e-mail. Lees voor meer informatie ons privacybeleid.

Ellipse 6