Forwarded from Taiwan Computer Network Crisis Management and Coordination Center: Cybersecurity Alert TWCERTCC-200-202512-00000006
[Content Description]
React is an open-source JavaScript library developed by Meta for building user interfaces.
Recently, Meta released a major cybersecurity vulnerability announcement (CVE-2025-55182, CVSS: 10.0), indicating a remote code execution vulnerability in React Server Components. Due to a security weakness in React's parsing of data sent to the React Server Function endpoint, attackers could potentially trigger arbitrary code execution through a specially crafted payload without authentication.
[Affected Platforms]
react-server-dom-webpack versions 19.0, 19.1.0, 19.1.1, and 19.2.0
react-server-dom-parcel versions 19.0, 19.1.0, 19.1.1, and 19.2.0
react-server-dom-turbopack versions 19.0, 19.1.0, 19.1.1, and 19.2.0
Affected React frameworks and bundlers include: next, react-router, waku, @parcel/rsc, @vitejs/plugin-rsc, and rwsdk.
[Recommended Actions]
Patch according to the solutions released on the official website: https://react.dev/blog/2025/12/03/critical-security-vulnerability-in-react-server-components