HomeVulnerabilityEssential RSC Bugs in React and Subsequent.js Permit Unauthenticated Distant Code Execution

Essential RSC Bugs in React and Subsequent.js Permit Unauthenticated Distant Code Execution

A maximum-severity security flaw has been disclosed in React Server Elements (RSC) that, if efficiently exploited, may lead to distant code execution.

The vulnerability, tracked as CVE-2025-55182, carries a CVSS rating of 10.0.

It permits “unauthenticated distant code execution by exploiting a flaw in how React decodes payloads despatched to React Server Perform endpoints,” the React Workforce mentioned in an alert issued at this time.

“Even when your app doesn’t implement any React Server Perform endpoints, it might nonetheless be weak in case your app helps React Server Elements.”

In response to cloud security agency Wiz, the problem is a case of logical deserialization that stems from processing RSC payloads in an unsafe method. Because of this, an unauthenticated attacker may craft a malicious HTTP request to any Server Perform endpoint that, when deserialized by React, achieves execution of arbitrary JavaScript code on the server.

Cybersecurity

The vulnerability impacts variations 19.0, 19.1.0, 19.1.1, and 19.2.0 of the next npm packages –

  • react-server-dom-webpack
  • react-server-dom-parcel
  • react-server-dom-turbopack
See also  Extreme Safety Flaws Patched in Microsoft Dynamics 365 and Energy Apps Net API

It has been addressed in variations 19.0.1, 19.1.2, and 19.2.1. New Zealand-based security researcher Lachlan Davidson has been credited with discovering and reporting the flaw on November 29, 2025.

It is value noting that the vulnerability additionally impacts Subsequent.js utilizing App Router. The difficulty has been assigned the CVE identifier CVE-2025-66478 (CVSS rating: 10.0). It impacts variations >=14.3.0-canary.77, >=15, and >=16. Patched variations are 16.0.7, 15.5.7, 15.4.8, 15.3.6, 15.2.6, 15.1.9, and 15.0.5.

That mentioned, any library that bundles RSC is prone to be affected by the flaw. This contains, however will not be restricted to, Vite RSC plugin, Parcel RSC plugin, React Router RSC preview, RedwoodJS, and Waku.

Wiz mentioned 39% of cloud environments have cases weak to CVE-2025-55182 and/or CVE-2025-66478. In gentle of the severity of the vulnerability, it is suggested that customers apply the fixes as quickly as potential for optimum safety.

- Advertisment -spot_img
RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -

Most Popular