On 3 December 2025, the React team disclosed a critical security vulnerability in React Server Components (RSC) protocol that affects JavaScript libraries React and Next.js (built on top of React) [1]. We recommend upgrading React, Next.js and custom applications that use react-server packages to the latest versions, which are described below.
The vulnerability affects applications using RSC in React 19.x and may lead to remote code execution (RCE). The issue arises from insecure deserialization of user-controlled input data that is passed into RSC. The React team emphasizes that only React Server components are vulnerable; React applications that do not include React Server components are not vulnerable.
Description
This vulnerability was initially reported on 29 November 2025 by security researchers and is identified as CVE-2025-55182 for React and CVE-2025-66478 for Next.js. On 4 December 2025, proof of concept code to exploit the vulnerability was released in public [3].
The vulnerability resides in the react-server-* packages and its handling of the RSC “Flight” protocol. When a react-server receives a specially crafted, malformed payload, it fails to validate the structure correctly, allowing attacker-controlled data to influence server-side execution logic, resulting in execution of privileged JavaScript code on the server.
The attack vector is unauthenticated and remote, requiring only a crafted HTTP request to vulnerable endpoints. Exploitation has shown near 100% success in testing
Impact
We assess the impact of this attack as high, as React is a popular framework used in various web applications: according to Wiz [2], 39% of cloud environments have instances vulnerable to CVE-2025-55182 and/or related Next.js CVE-2025-66478. Without follow-up action, the vulnerability could lead to exploitation of many internet-facing React web applications (that make use of the vulnerable components).
Services like Cloudflare and Vercel have implemented rules in their Web Application Firewalls that prevent this attack.
Risk
The risk level is also considered high, as the vulnerability is easily exploited (unauthenticated, remote), React and Next.js are widespread in production and default configurations are vulnerable.
Mitigation
Customers that use web applications that have integrated React Server are strongly advised to install the relevant updated versions as soon as possible.
Affected versions:
Patched releases:
-
Next.js: 14.3.0-canary.88, 15.0.5, 15.1.9, 15.2.6, 15.3.6, 15.4.8, 15.5.7, 16.0.7
What Should You Do?
We recommend implementing the above mitigation steps as soon as possible. To do so, it is paramount to identify which public-facing web applications (1) use React / Next.js and (2) include the vulnerable React Server Components. If the application cannot be patched, we strongly advise to remove the application from public exposure.
What Will Northwave Do?
We will continue to monitor developments related to this attack. If new critical information arises, we will contact you. If you would like additional information, please feel free to call us or send an email.
Do you have an incident right now? Call our Incident Response Team: 00800 1744 0000
Disclaimer applies, see below.
Sources
[1]: Critical Security Vulnerability in React Server Components – React
[2]: Critical RCE Vulnerabilities Discovered in React & Next.js | Wiz Blog
[3]: GitHub - ejpir/CVE-2025-55182-poc: CVE-2025-55182 POC