[Security Vulnerability Alert] Meta's React Server Components contains a critical cybersecurity vulnerability (CVE-2025-55182).

 
2025/12/16 ~ 2026/6/16
View Count:38

Forwarded from Taiwan Computer Network Crisis Management and Coordination Center: Cybersecurity Alert TWCERTCC-200-202512-00000006

[Content Description]
React is an open-source JavaScript library developed by Meta for building user interfaces.

Recently, Meta released a major cybersecurity vulnerability announcement (CVE-2025-55182, CVSS: 10.0), indicating a remote code execution vulnerability in React Server Components. Due to a security weakness in React's parsing of data sent to the React Server Function endpoint, attackers could potentially trigger arbitrary code execution through a specially crafted payload without authentication.

[Affected Platforms]
react-server-dom-webpack versions 19.0, 19.1.0, 19.1.1, and 19.2.0
react-server-dom-parcel versions 19.0, 19.1.0, 19.1.1, and 19.2.0
react-server-dom-turbopack versions 19.0, 19.1.0, 19.1.1, and 19.2.0

Affected React frameworks and bundlers include: next, react-router, waku, @parcel/rsc, @vitejs/plugin-rsc, and rwsdk.

[Recommended Actions]
Patch according to the solutions released on the official website: https://react.dev/blog/2025/12/03/critical-security-vulnerability-in-react-server-components

Files
system_update_alt參考資料
Top↑