PT-2025-48817 · Meta · React-Server-Dom-Webpack +3
Published
2025-12-03
·
Updated
2025-12-04
·
CVE-2025-55182
CVSS v3.1
10
10
Critical
| Base vector | Vector | AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions
React versions 19.0.0 through 19.2.0
react-server-dom-parcel versions 19.0.0 through 19.2.0
react-server-dom-turbopack versions 19.0.0 through 19.2.0
react-server-dom-webpack versions 19.0.0 through 19.2.0
Next.js versions 15 and 16
Next.js Canary versions 14.3.0 and later
Description
A critical remote code execution vulnerability exists in React Server Components due to unsafe deserialization of payloads from HTTP requests to Server Function endpoints. This allows unauthenticated attackers to execute arbitrary code on the server. The vulnerability affects React versions 19.0.0 through 19.2.0, and frameworks like Next.js, react-router, Waku, Parcel RSC, and Vite RSC. Exploitation is actively occurring, with proof-of-concept exploits publicly available. Approximately 200,000+ React applications and 30,000+ are potentially exposed. The vulnerability stems from a missing hasOwnProperty check during module loading. Attackers can send crafted HTTP POST requests to exploit the flaw. The
vm#runInThisContext function is involved in the execution of arbitrary code.Recommendations
Upgrade to React version 19.0.1
Upgrade to React version 19.1.2
Upgrade to React version 19.2.1
Upgrade Next.js to version 16.0.7 or later
Restrict access to vulnerable modules or functions as a temporary workaround
Consider blocking POST requests with
Content-Transfer-Encoding: base64 headersExploit
Fix
Found an issue in the description? Have something to add? Feel free to write us 👾
dbugs@ptsecurity.com
Related Identifiers
CVE-2025-55182
Affected Products
React Server Components
React-Server-Dom-Parcel
React-Server-Dom-Turbopack
React-Server-Dom-Webpack
References · 181
- 🔥 https://github.com/ejpir/CVE-2025-55182-poc⭐ 113 🔗 38 · Exploit
- https://nvd.nist.gov/vuln/detail/CVE-2025-55182 · Security Note
- https://twitter.com/Cloudflare/status/1996248422328713362 · Twitter Post
- https://twitter.com/grok/status/1996440349062119509 · Twitter Post
- https://twitter.com/C2IRIS/status/1996356537833636255 · Twitter Post
- https://t.me/RNetsec/22283 · Telegram Post
- https://twitter.com/myhackerhouse/status/1996289686260580612 · Twitter Post
- https://twitter.com/ryancbarnett/status/1996324605909500284 · Twitter Post
- https://twitter.com/VulmonFeeds/status/1996264988135031202 · Twitter Post
- https://twitter.com/senthazalravi/status/1996337824627605960 · Twitter Post
- https://twitter.com/marcisnobody/status/1996311055908446662 · Twitter Post
- https://twitter.com/hmier/status/1996284552902217895 · Twitter Post
- https://twitter.com/marcel_butucea/status/1996426266975842567 · Twitter Post
- https://github.com/ghe770mvp/RSC_Vuln_Lab · Note
- https://twitter.com/grok/status/1996260003947429976 · Twitter Post