React Server Components RCE Vulnerability CVE-2025-55182

React's shiny Server Components promised edge performance. Then came CVE-2025-55182: unauthenticated RCE with a perfect 10.0 score. Devs worldwide scrambling.

React Server Components' Perfect-Score RCE Flaw Exposes Millions of Apps — theAIcatchup

Key Takeaways

  • CVSS 10.0 RCE flaw in React Server Components affects even non-Server Function apps.
  • Next.js, React Router, and bundlers like Vite/Parcel need immediate patches.
  • Exposes risks in RSC hype—expect adoption pause amid deserialization dangers.

React Server Components were the talk of every conference last year. Smooth server-side rendering, zero-config hydration—everyone expected smoothly scaling into 2025. But here’s the jolt: on December 3, the React Team dropped a bomb. CVE-2025-55182. Unauthenticated remote code execution. CVSS 10.0. Perfect score. Full takeover potential.

This isn’t some edge-case buffer overflow. An attacker crafts a bad HTTP request to any React Server Function endpoint. Boom—deserialization flaw lets it run arbitrary code on your server. Even if you’re not using Server Functions directly. Just enabling React Server Components? Vulnerable.

There is an unauthenticated remote code execution vulnerability in React Server Components. We recommend upgrading immediately.

That’s straight from the React Team’s advisory. No sugarcoating.

Versions 19.0 through 19.2.0. Patched in 19.0.1, 19.1.2, 19.2.1. Simple npm update. But the ripple? Massive. Next.js—from 13.3.x to 16.x canaries—specific patches listed. React Router’s unstable RSC APIs. Waku, Parcel RSC, Vite plugin, RWSDK. Hosting providers threw up temp mitigations (don’t bet your farm on those).

Does Your Next.js App Have a Bullseye?

Next.js dominates React deployments—over 40% market share per recent surveys. If you’re on 13.3 or later, hit npm install [email protected] for 13/14 lines. 15.x? Pin to 15.0.8 through 15.5.10. Canaries? Downgrade to stable. The commands are exhaustive, but miss one, and you’re toast.

Look. React Server Components (RSC) were Vercel’s big bet—pushing full-stack React without client bloat. Adoption spiked post-React 19. But this vuln screams immaturity. Deserialization attacks? Ancient. Think Java’s ysoserial payloads from a decade ago. React’s HTTP-to-function translation layer? Wide open.

And the kicker—my unique angle here—echoes Log4Shell’s 2021 chaos. That Java logging lib owned the JVM world overnight. React’s server DOM parcels (webpack, turbopack) mirror that: opt-in server features baked into frameworks everyone uses. Result? Silent propagation. Monorepos with React Native? Update those server-dom packages only. But most won’t.

Frameworks scrambled. Next.js blog lit up with changelogs. Expo, Redwood, Waku—all patching. React Native users in monorepos? Selective upgrades to avoid mismatches. Chaos, but contained—for now.

Market dynamics shift fast. RSC hype drove Next.js to $2B+ valuations whispers for Vercel. This? Pauses that momentum. Teams eyeballing Remix or solid starters (pun intended) might balk. Why risk RCE when client-side hydration works fine? Expect Q1 2026 surveys showing 10-15% dip in RSC enablement.

Why Can’t You Sleep on This Patch?

CVSS 10.0 isn’t hyperbole. Attack complexity: low. Privileges: none. Scope: changed (hits server from client). Full confidentiality, integrity, availability smash. Public endpoints? Game over. E-commerce sites on Next.js? Payment flows hijacked. SaaS dashboards? Data exfil city.

React Team coordinated rollout—details post-patch. Smart. But PR spin downplays ecosystem blast radius. “If no server, safe.” Sure. But who runs React client-only in prod? Bundlers like Vite, Parcel embed RSC hooks. Peer deps drag in vuln React.

Upgrade paths vary wildly. Next.js canary on 14.3.0? Roll back to 14 stable. React Router? npm install react@latest react-server-dom-webpack@latest. Waku? Latest everything. Redwood docs guide migrations. It’s doable. But in a world of yarn workspaces and pnpm stores? Human error looms.

Here’s the thing—RSC’s promise (colocated components, streaming payloads) trades security for speed. Deserialization’s inherent risk amplified by JS’s eval-like flexibility. Bold prediction: Meta’s React Forget era won’t forget this. Expect stricter audits, maybe opt-out gates in Next 17.

Hosting giants—Vercel, Netlify, Cloudflare—patched edges. Good neighbors. But as they say, don’t depend on mitigations. One unpatched Vercel deploy, and attackers probe.

Developers, check your package.json. Run npm ls react-server-dom-webpack or equivalents. No output? Maybe safe. But frameworks mask it. Audit your lockfile.

This exposes a broader JS server truth. Node’s event loop lured us server-side. Now, with RSC, we’re serializing whole component trees over HTTP. Tasty for attackers. Historical parallel: Node’s 2014 prototype pollution waves. Patched quick, but scarred trust. React’s turn.

Vercel’s stock (if public) dips on headlines. OSS fatigue sets in—another zero-day in a lib you “own.” But credit where due: disclosure swift, patches ready. Lachlan Davidson’s report on Nov 29? Hero work.

How Bad Is the Real-World Risk?

Low-hanging fruit first. Public RSC endpoints without auth? Trivial. Craft payload via Burp or curl. Deserialize. Shell. But most apps gate functions. Still—recon scans hit every port 3000.

Stats: Next.js powers 2M+ sites (per BuiltWith). 20% experiment RSC? That’s 400k vectors. Patch diffusion? npm’s fast, but CI/CD lags. Week 1 exposure: high.

Corporate hype check: React Team’s advisory is terse—good for panic button. No fluff. But “even if no Server Functions” line? Buried lede. Widens net.

Long game. This accelerates RSC maturation. Or kills it. Watch adoption metrics on npm trends post-patch. My bet: stall, then surge with audits.


🧬 Related Insights

Frequently Asked Questions

What is CVE-2025-55182?

Unauthenticated RCE in React Server Components via bad payload deserialization. CVSS 10.0. Hits React 19.0-19.2.0 and frameworks like Next.js.

How do I fix React Server Components vulnerability?

Upgrade React to 19.0.1+, Next.js per version (e.g., [email protected]). Run npm ls on server-dom packages. Check framework blogs.

Is Next.js safe after patching?

Yes, if on listed versions. But audit deps. Temp hosting mitigations exist—don’t rely solely.

Does this affect client-only React apps?

No. Serverless or pure client? Untouched. RSC requires server.

James Kowalski
Written by

Investigative tech reporter focused on AI ethics, regulation, and societal impact.

Frequently asked questions

What is CVE-2025-55182?
Unauthenticated RCE in React Server Components via bad payload deserialization. CVSS 10.0. Hits React 19.0-19.2.0 and frameworks like Next.js.
How do I fix <a href="/tag/react-server-components-vulnerability/">React Server Components vulnerability</a>?
Upgrade React to 19.0.1+, Next.js per version (e.g., [email protected]). Run npm ls on server-dom packages. Check framework blogs.
Is Next.js safe after patching?
Yes, if on listed versions. But audit deps. Temp hosting mitigations exist—don't rely solely.
Does this affect client-only React apps?
No. Serverless or pure client

Worth sharing?

Get the best AI stories of the week in your inbox — no noise, no spam.

Originally reported by React Blog

Stay in the loop

The week's most important stories from theAIcatchup, delivered once a week.