轉發 台灣電腦網路危機處理暨協調中心 資安訊息警訊 TWCERTCC-200-202512-00000006
[內容說明]
React是一個由Meta開發的開源JavaScript函式庫,用於建構使用者介面。
近日Meta發布重大資安漏洞公告(CVE-2025-55182,CVSS:10.0),指出 React Server Components 存在遠端程式碼執行漏洞。由於 React 在解析傳送至 React Server Function 端點的資料時存在安全弱點,攻擊者無需通過身分驗證,即可能透過特製有效負載觸發任意程式碼執行。
[影響平台]
react-server-dom-webpack 19.0、19.1.0、19.1.1、19.2.0版本
react-server-dom-parcel 19.0、19.1.0、19.1.1、19.2.0版本
react-server-dom-turbopack 19.0、19.1.0、19.1.1、19.2.0版本
受影響的 React 框架與打包工具包括:next, react-router, waku, @parcel/rsc, @vitejs/plugin-rsc 及 rwsdk。
[建議措施]
根據官方網站釋出的解決方式進行修補:https://react.dev/blog/2025/12/03/critical-security-vulnerability-in-react-server-components
Forwarded from Taiwan Computer Network Crisis Management and Coordination Center: Cybersecurity Alert TWCERTCC-200-202512-00000006
[Content Description]
React is an open-source JavaScript library developed by Meta for building user interfaces.
Recently, Meta released a major cybersecurity vulnerability announcement (CVE-2025-55182, CVSS: 10.0), indicating a remote code execution vulnerability in React Server Components. Due to a security weakness in React's parsing of data sent to the React Server Function endpoint, attackers could potentially trigger arbitrary code execution through a specially crafted payload without authentication.
[Affected Platforms]
react-server-dom-webpack versions 19.0, 19.1.0, 19.1.1, and 19.2.0
react-server-dom-parcel versions 19.0, 19.1.0, 19.1.1, and 19.2.0
react-server-dom-turbopack versions 19.0, 19.1.0, 19.1.1, and 19.2.0
Affected React frameworks and bundlers include: next, react-router, waku, @parcel/rsc, @vitejs/plugin-rsc, and rwsdk.
[Recommended Actions]
Patch according to the solutions released on the official website: https://react.dev/blog/2025/12/03/critical-security-vulnerability-in-react-server-components