Critical Remote Code Execution Vulnerability in React Server Components (CVE-2025-55182)
Published on 04-Dec-2025 16:00:00

Immediate Actions
Patch immediately: Upgrade React Server Components packages to patched releases (19.0.1, 19.1.2, 19.2.1 or later) and update frameworks (Next.js and others) to their fixed releases. Treat every public-facing app using React 19 RSC as at-risk until upgraded (Next.js)
If you cannot patch immediately: Enable/ensure a WAF with virtual patch rules for this RCE (Cloudflare, Fastly, Fastly NGWAF, and others have emergency protections available). Proxying traffic through a WAF with the emergency rule gives immediate mitigation.
Restrict access to server-function endpoints where practical (allow list management IPs, internal networks only).
Audit projects/CI for the vulnerable packages (scan your monorepos, build images, container images and package-locks for react-server-dom-*). Treat scaffolded apps (create-next-app, templates) as potentially vulnerable.
Download the full Advisory as PDF
References
https://react.dev/blog/2025/12/03/critical-security-vulnerability-in-react-server-components
https://nvd.nist.gov/vuln/detail/CVE-2025-55182
https://www.tenable.com/blog/react2shell-cve-2025-55182-react-server-components-rce