Critical React Server Components Vulnerability (CVE-2025-55182): Upgrade Now
CRITICAL SECURITY ALERT: On December 3, 2025, the React team disclosed CVE-2025-55182—a maximum severity (CVSS 10.0) vulnerability in React Server Components that allows unauthenticated remote code execution. If your application uses React 19 with Server Components, you must upgrade immediately. This is not a drill.
What Is the Vulnerability?
The vulnerability exists in how React decodes payloads sent to React Server Function endpoints. An attacker can craft malicious HTTP requests that, when deserialized by React, achieve remote code execution on the server.
// Attack vector (simplified)
// Malicious request to Server Function endpoint
POST /api/server-function HTTP/1.1
Content-Type: application/x-react-server-reference
[Crafted payload that executes arbitrary code on deserialization]
This is particularly dangerous because:
- No authentication required: Attackers don't need valid credentials
- Remote execution: Attack can be launched from anywhere on the internet
- Server-side impact: Compromises your server, not just the client
- Maximum severity: CVSS score of 10.0—the highest possible rating
Important: Even if your app doesn't explicitly implement React Server Function endpoints, you may still be vulnerable if your framework supports React Server Components.
Am I Affected?
Affected Versions
The vulnerability exists in versions 19.0, 19.1.0, 19.1.1, and 19.2.0 of:
react-server-dom-webpackreact-server-dom-parcelreact-server-dom-turbopack
Affected Frameworks
- • Next js (with App Router)
- • React Router (RSC mode)
- • Waku
- • @parcel/rsc
- • @vitejs/plugin-rsc
- • rwsdk (Redwood SDK)
- • Expo
You Are NOT Vulnerable If:
- Your React code runs entirely on the client (no server)
- You don't use a framework/bundler that supports React Server Components
- You're still on React 18 or earlier
The Solution: Upgrade Immediately
Fixed React Versions
Upgrade to one of these patched versions:
- • 19.0.1 (for 19.0.x)
- • 19.1.2 (for 19.1.x)
- • 19.2.1 (for 19.2.x)
Next js Users
# For Next js 15.0.x
npm install next@15.0.5
# For Next js 15.1.x
npm install next@15.1.9
# For Next js 15.2.x
npm install next@15.2.6
# For Next js 15.3.x
npm install next@15.3.6
# For Next js 15.4.x
npm install next@15.4.8
# For Next js 15.5.x
npm install next@15.5.7
# For Next js 16.0.x
npm install next@16.0.7
Using Next js canary? If you're on any canary version from 14.3.0-canary.77 onwards, downgrade to stable immediately:
npm install next@14
React Router Users (RSC APIs)
# Update all relevant packages
npm install react@latest
npm install react-dom@latest
npm install react-server-dom-parcel@latest
npm install react-server-dom-webpack@latest
npm install @vitejs/plugin-rsc@latest
General React Server DOM Packages
# For webpack bundler
npm install react@latest react-dom@latest react-server-dom-webpack@latest
# For parcel bundler
npm install react@latest react-dom@latest react-server-dom-parcel@latest
# For turbopack bundler
npm install react@latest react-dom@latest react-server-dom-turbopack@latest
Verification Steps
# Check your installed versions
npm list react react-dom react-server-dom-webpack next
# Expected output should show patched versions:
# react@19.0.1 (or 19.1.2, 19.2.1)
# react-server-dom-webpack@19.0.1 (or 19.1.2, 19.2.1)
# next@15.0.5 (or other patched version)
1. Clear node_modules and reinstall
rm -rf node_modules && npm install
2. Clear build cache
rm -rf .next && npm run build
3. Deploy to production
Redeploy your application with the updated dependencies
Timeline of Events
Vulnerability reported by Lachlan Davidson via Meta Bug Bounty program
Meta security confirmed the vulnerability; React team began developing fix
Fix created; coordination with hosting providers and affected framework teams began
Patches published to npm; CVE-2025-55182 publicly disclosed
Don't Rely on Hosting Provider Mitigations
"Do not rely solely on temporary hosting provider mitigations. Upgrade your dependencies immediately."
Provider mitigations are a temporary band-aid. They may not catch all attack variations. The only reliable fix is upgrading to the patched React versions.
Security Checklist for React Server Components
- ✓ Keep React and framework dependencies up to date
- ✓ Subscribe to security advisories for React, Next js, and your framework
-
✓
Use
npm auditin CI/CD pipelines - ✓ Implement server-side rate limiting on API routes
- ✓ Validate and sanitize all inputs, even in Server Actions
Need Help Securing Your React Application?
Technspire provides security audits and remediation services for React and Next js applications. We can help you assess your exposure and upgrade safely.
Contact Us for a Security AssessmentSummary: What You Need to Do
- Check if you're affected: Using React 19 with Server Components? You're affected.
- Upgrade immediately: React 19.0.1, 19.1.2, or 19.2.1
- Verify the upgrade: Run
npm listto confirm - Deploy to production: Don't just update locally—push to production ASAP
CVE-2025-55182 is a wake-up call for the React ecosystem. As Server Components become the default pattern, security considerations become more critical than ever. Stay updated, stay patched, and stay vigilant.