Severe RSC Bugs in React and Next.js Enable Unauthenticated Remote Code Execution
- Dec 4, 2025
- 2 min read
Key Findings
Critical security flaw discovered in React Server Components (RSC) with a CVSS score of 10.0 (maximum severity)
Vulnerability allows unauthenticated remote code execution (RCE) by exploiting a deserialization issue in how React decodes payloads sent to React Server Function endpoints
Issue affects React versions 19.0, 19.1.0, 19.1.1, and 19.2.0, as well as Next.js versions >=14.3.0-canary.77, >=15, and >=16
Vulnerability codenamed "React2shell" and assigned CVE-2025-55182 and CVE-2025-66478
Impacts a wide range of React-based frameworks and bundlers beyond just React and Next.js
Immediate patching is required to mitigate the critical risk
Background
The React Team recently disclosed a maximum-severity security flaw in React Server Components (RSC) that, if successfully exploited, could result in remote code execution. The vulnerability, tracked as CVE-2025-55182, carries a CVSS score of 10.0 and has been codenamed "React2shell."
Vulnerability Details
The issue stems from unsafe handling of serialized payloads in the React Flight protocol. Malformed or adversarial payloads can influence server-side execution in unintended ways, leading to remote code execution. An unauthenticated attacker could craft a malicious HTTP request to any Server Function endpoint that, when deserialized by React, achieves execution of arbitrary JavaScript code on the server.
Affected Components
The vulnerability impacts versions 19.0, 19.1.0, 19.1.1, and 19.2.0 of the following npm packages:
react-server-dom-webpack
react-server-dom-parcel
react-server-dom-turbopack
It has been addressed in versions 19.0.1, 19.1.2, and 19.2.1.
The issue also affects Next.js using App Router, with the CVE identifier CVE-2025-66478 (CVSS score: 10.0). Patched versions are 16.0.7, 15.5.7, 15.4.8, 15.3.6, 15.2.6, 15.1.9, and 15.0.5.
Wider Impact
The vulnerability cascades down to a wide range of React-based frameworks and bundlers, including:
Vite RSC plugin
Parcel RSC plugin
React Router RSC preview
RedwoodJS
Waku
Mitigation Strategies
Immediately upgrade to patched versions of React, Next.js, and any other affected frameworks/bundlers
Deploy Web Application Firewall (WAF) rules if available to monitor and block suspicious activity
Restrict network access to Server Function endpoints until patches can be applied
Conclusion
The discovery of this critical vulnerability in the React ecosystem highlights the need for vigilant security practices, even in widely-adopted and trusted frameworks. Prompt action is required to mitigate the significant risk posed by this flaw, which allows unauthenticated remote code execution with maximum severity. All users of affected components should prioritize applying the necessary patches as soon as possible.
Sources
https://thehackernews.com/2025/12/critical-rsc-bugs-in-react-and-nextjs.html
https://securityonline.info/catastrophic-react-flaw-cve-2025-55182-cvss-10-0-allows-unauthenticated-rce-on-next-js-and-server-components/
https://medium.com/@bastradamus/critical-vulnerabilities-in-react-and-next-js-security-advisory-01a3de27f1e2
https://www.linkedin.com/posts/davidcoombe_critical-rsc-bugs-in-react-and-nextjs-allow-activity-7402185781941088256-lgMw


Comments