There is an unauthenticated remote code execution vulnerability in React Server Components.
Even if your app does not implement any React Server Function endpoints it may still be vulnerable if your app supports React Server Components.
If your app’s React code does not use a server, your app is not affected by this vulnerability.
CVE-2025-55182
Mastodon server not impacted btw.
react.dev/blog/2025/12/03/crit…
Critical Security Vulnerability in React Server Components – React
The library for web and native user interfacesreact.dev


R.C.
in reply to Kevin Beaumont • • •Kevin Beaumont
in reply to Kevin Beaumont • • •GNU/Knoppers
in reply to Kevin Beaumont • • •Cat 🐈🥗 (D.Burch)
in reply to Kevin Beaumont • • •Cedric
in reply to Kevin Beaumont • • •cvelistv5 - CVE-2025-55182
vulnerability.circl.luKevin Beaumont
in reply to Cedric • • •Andrew Golding
in reply to Kevin Beaumont • • •I had to doublecheck our FE at work just to be sure we're not using the affected components. Luckily, while React Router (formerly remix) is affected by this, it is only affected if experimental support for React Server Components is enabled.
Meanwhile, this does nothing to lessen the general levels of ire I have for the entire JavaScript and friends ecosystem.
Ryan Clough
in reply to Kevin Beaumont • • •Kevin Beaumont
in reply to Kevin Beaumont • • •The React vulns have the usual panicked nonsense going on - people posting fake PoCs (all of them are fake), people spraying fake PoCs over the whole internet, people posting screenshots of fake PoC activity thinking it real, doomsday scenario posts etc etc.
It’s actually a niche scenario bug for vast majority of orgs, just stay calm and patch if you are actually impacted (spoiler: you probably aren’t).
SirBeringer
in reply to Kevin Beaumont • • •Kevin Beaumont
in reply to Kevin Beaumont • • •nachtpfoetchen vague era
in reply to Kevin Beaumont • • •João Tiago Rebelo (NAFO J-121)
in reply to Kevin Beaumont • • •" Resolved - This incident has been resolved.
A change made to how Cloudflare's Web Application Firewall parses requests caused Cloudflare's network to be unavailable for several minutes this morning. This was not an attack; the change was deployed by our team to help mitigate the industry-wide vulnerability disclosed this week in React Server Components. We will share more information as we have it today.
Dec 5, 09:20 UTC "
Henryk Plötz
in reply to Kevin Beaumont • • •It's all the more hilarious because "uploading a bad WAF configuration change" is so far the leading cause of global CDN outages. That was The Big One in 2019 and they had a detailed writeup on how this isn't going to happen again. And in the mean time crowdstrike gave us a refresher on what global bad configuration deployments look like.
And then cloudflare comes and did it again. Ooops.
(At least this time it only took them 20mins to find the rollback button. Progress, I guess.)
Apicultor 🐝
in reply to Kevin Beaumont • • •Kevin Beaumont
in reply to Kevin Beaumont • • •cybersecurity-industry-overreacts-to-react-vulnerability-starts-panic-burns-own-house-down-again-e85c10ad1607
doublepulsar.comsnaeqe
in reply to Kevin Beaumont • • •Simon Zerafa (Status: 🤧😮💨💊)
in reply to Kevin Beaumont • • •Perhaps this needs to be called the OVER REACT bug? 😉
Still, an alleged 10.0 is quite an achievement.
PoC via @maple3142
gist.github.com/maple3142/48bc…
CVE-2025-55182 React Server Components RCE POC
GistDavid Penfold
in reply to Kevin Beaumont • • •Kevin Beaumont
in reply to Kevin Beaumont • • •Really interesting thing happening with the React vuln where lots of the cyber companies reporting exploitation don't appear to realise they're reporting on exploit attempts for GitHub PoCs which aren't actually real - said PoCs just set up a vuln webapp in a way nobody would in real world.
It's not all the attempts but it's a large portion.
Me:
Kevin Beaumont
in reply to Kevin Beaumont • • •uoxc
in reply to Kevin Beaumont • • •gregR ☯
in reply to Kevin Beaumont • • •Can I haz pop-corn ?
SANS Internet Storm Center - SANS.edu - Go Sentinels! (@sans_isc@infosec.exchange)
SANS Internet Storm Center - SANS.edu - Go Sentinels! (Infosec Exchange)SwiftOnSecurity
in reply to Kevin Beaumont • • •fuzzyfuzzyfungus
in reply to Kevin Beaumont • • •Q.U.I.N.N.
in reply to Kevin Beaumont • • •is there some reason people keep taking their entire enterprise own instead of like. canary rollouts.
can we maybe not all be stupid and keep centralizing everything to the point of catastrophic societal failure because someone flubbed a key rotation
Dark Horse
in reply to Kevin Beaumont • • •mschade_
in reply to Kevin Beaumont • • •React Server Components (RSC) Remote Code Execution Vulnerabilities – Qualys ThreatPROTECT
threatprotect.qualys.comKevin Beaumont reshared this.
Kevin Beaumont
in reply to mschade_ • • •Ed Sanders
in reply to Kevin Beaumont • • •Christoffer S.
in reply to Kevin Beaumont • • •Worth mentioning that Next.js appears affected 15.x and 16.x.
nextjs.org/blog/CVE-2025-66478
Security Advisory: CVE-2025-66478
Josh Story (nextjs.org)Kevin Beaumont
in reply to Christoffer S. • • •Matt "msw" Wilson
in reply to Kevin Beaumont • • •Kevin Beaumont
Unknown parent • • •MemoryLeech
in reply to Kevin Beaumont • • •