There is an unauthenticated remote code execution vulnerability in React Server Components.

Even if your app does not implement any React Server Function endpoints it may still be vulnerable if your app supports React Server Components.

If your app’s React code does not use a server, your app is not affected by this vulnerability.

CVE-2025-55182

Mastodon server not impacted btw.

react.dev/blog/2025/12/03/crit…

in reply to Kevin Beaumont

I had to doublecheck our FE at work just to be sure we're not using the affected components. Luckily, while React Router (formerly remix) is affected by this, it is only affected if experimental support for React Server Components is enabled.

Meanwhile, this does nothing to lessen the general levels of ire I have for the entire JavaScript and friends ecosystem.

in reply to Kevin Beaumont

The React vulns have the usual panicked nonsense going on - people posting fake PoCs (all of them are fake), people spraying fake PoCs over the whole internet, people posting screenshots of fake PoC activity thinking it real, doomsday scenario posts etc etc.

It’s actually a niche scenario bug for vast majority of orgs, just stay calm and patch if you are actually impacted (spoiler: you probably aren’t).

in reply to Kevin Beaumont

#Alt4You #AltText post from Cloudflare's status page that says:
" Resolved - This incident has been resolved.
A change made to how Cloudflare's Web Application Firewall parses requests caused Cloudflare's network to be unavailable for several minutes this morning. This was not an attack; the change was deployed by our team to help mitigate the industry-wide vulnerability disclosed this week in React Server Components. We will share more information as we have it today.
Dec 5, 09:20 UTC "
in reply to Kevin Beaumont

It's all the more hilarious because "uploading a bad WAF configuration change" is so far the leading cause of global CDN outages. That was The Big One in 2019 and they had a detailed writeup on how this isn't going to happen again. And in the mean time crowdstrike gave us a refresher on what global bad configuration deployments look like.

And then cloudflare comes and did it again. Ooops.

(At least this time it only took them 20mins to find the rollback button. Progress, I guess.)

in reply to Kevin Beaumont

Really interesting thing happening with the React vuln where lots of the cyber companies reporting exploitation don't appear to realise they're reporting on exploit attempts for GitHub PoCs which aren't actually real - said PoCs just set up a vuln webapp in a way nobody would in real world.

It's not all the attempts but it's a large portion.

Me:

in reply to Kevin Beaumont

infosec.exchange/@sans_isc/115…
Can I haz pop-corn ?