Vulnerability Description
A pre-authentication remote code execution vulnerability exists in React Server Components versions 19.0.0, 19.1.0, 19.1.1, and 19.2.0 including the following packages: react-server-dom-parcel, react-server-dom-turbopack, and react-server-dom-webpack. The vulnerable code unsafely deserializes payloads from HTTP requests to Server Function endpoints.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| React | 19.0.0 | |
| Vercel | Next.Js | >= 15.0.0, < 15.0.5 |
Related Weaknesses (CWE)
References
- https://react.dev/blog/2025/12/03/critical-security-vulnerability-in-react-servePatchVendor Advisory
- https://www.facebook.com/security/advisories/cve-2025-55182Vendor Advisory
- http://www.openwall.com/lists/oss-security/2025/12/03/4Mailing ListPatchThird Party Advisory
- https://news.ycombinator.com/item?id=46136026Issue Tracking
- https://aws.amazon.com/blogs/security/china-nexus-cyber-threat-groups-rapidly-exThird Party Advisory
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-US Government Resource
FAQ
What is CVE-2025-55182?
CVE-2025-55182 is a vulnerability with a CVSS score of 10.0 (CRITICAL). A pre-authentication remote code execution vulnerability exists in React Server Components versions 19.0.0, 19.1.0, 19.1.1, and 19.2.0 including the following packages: react-server-dom-parcel, react-...
How severe is CVE-2025-55182?
CVE-2025-55182 has been rated CRITICAL with a CVSS base score of 10.0/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2025-55182?
Check the references section above for vendor advisories and patch information. Affected products include: Facebook React, Vercel Next.Js.