⚠️ Urgent Security Advisory: Critical Vulnerability in React Ecosystem

The CVE-2025-55182 vulnerability, officially disclosed by the React team, is a critical security flaw (CVSS 10.0) that allows unauthenticated remote code execution (RCE) on the server. Any application using React Server Components (RSC) or React Server Functions is potentially affected. You can find the official disclosure on the React blog.

This vulnerability stems from a flaw in how React decodes payloads sent to Server Function endpoints, enabling crafted HTTP requests to execute arbitrary code.

Shield with React logo representing security vulnerability and patch Technical Structure Concept

🔧 Framework-Specific Immediate Action Guide

Execute the following commands in your project root based on your tech stack.

# For Next.js users (most common)
# Update to the patched version for your major release line
npm install next@14.2.35  # for users on 13.3.x, 13.4.x, 13.5.x, 14.x
npm install next@15.0.8   # for users on 15.0.x
npm install next@15.1.12  # for users on 15.1.x
# ... see official guide for other versions

# React + Vite (using plugin-rsc)
npm install react@latest react-dom@latest @vitejs/plugin-rsc@latest

# React Router (using unstable RSC APIs)
npm install react@latest react-dom@latest react-server-dom-webpack@latest

# General React project (if using relevant packages)
npm install react@19.0.1 react-dom@19.0.1 react-server-dom-webpack@latest

Note: Always update react and react-dom together. Do not rely on hosting providers' temporary mitigations as a permanent solution.

Server rack with warning sign symbolizing React Server Components vulnerability Programming Illustration

📊 Vulnerability Impact & Key Considerations

ItemDetails
CVE IDCVE-2025-55182
CVSS Score10.0 (CRITICAL)
Affected Versionsreact, react-dom, react-server-dom-* packages versions 19.0.0, 19.1.0, 19.1.1, 19.2.0
Patched Versions19.0.1, 19.1.2, 19.2.1 (or latest for each package)
Affected FrameworksNext.js, React Router, Waku, Vite RSC Plugin, Parcel RSC, etc.
Not AffectedPure CSR apps without a server, bundlers without RSC support

Limitations & Critical Notes:

  1. Monorepo Caution: If using React Native in a monorepo, updating react/react-dom may cause version mismatch errors. Only update the affected react-server-dom-* packages in this scenario.
  2. Canary Releases: If you are on a Next.js Canary release, downgrading to the latest stable patched version is advised.
  3. Deep-Dive Pending: Full technical details of the exploit vector will be released after the patch rollout is complete. Focus on updating first.

Developer working on terminal updating React packages to secure version Software Concept Art

🚀 Next Steps & Best Practices for Developers

  1. Act Now: Audit package.json files for all production React projects to check if you're using an affected version.
  2. Dependency Scan: Run npm ls react react-dom react-server-dom-webpack react-server-dom-parcel react-server-dom-turbopack to verify installed versions.
  3. Test & Deploy: Perform regression testing on core functionalities after updating in a development/staging environment before deploying to production.
  4. Continuous Learning: This incident highlights the new security responsibilities that come with meta-frameworks and deep server component integration. Deepening your understanding of server-client boundaries and serialization security is a key learning path forward.

Applying security patches without delay remains the best defense. Keep your projects secure.