Home

Description

A pre-authentication remote code execution vulnerability exists in React Server Components versions 19.0.0, 19.1.0, 19.1.1, and 19.2.0 including the following packages: react-server-dom-parcel, react-server-dom-turbopack, and react-server-dom-webpack. The vulnerable code unsafely deserializes payloads from HTTP requests to Server Function endpoints.

PUBLISHED Reserved 2025-08-08 | Published 2025-12-03 | Updated 2025-12-11 | Assigner Meta




CRITICAL: 10.0CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

CISA Known Exploited Vulnerability

Date added 2025-12-05 | Due date 2025-12-12

Known Ransomware Campaign(s)  

Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

Problem types

Deserialization of Untrusted Data (CWE-502)

Product status

Default status
unaffected

19.0.0 (semver)
affected

19.1.0 (semver)
affected

19.2.0 (semver)
affected

Default status
unaffected

19.0.0 (semver)
affected

19.1.0 (semver)
affected

19.2.0 (semver)
affected

Default status
unaffected

19.0.0 (semver)
affected

19.1.0 (semver)
affected

19.2.0 (semver)
affected

References

aws.amazon.com/...-react2shell-vulnerability-cve-2025-55182/ media-coverage

www.cisa.gov/...erabilities-catalog?field_cve=CVE-2025-55182 government-resource

www.openwall.com/lists/oss-security/2025/12/03/4

news.ycombinator.com/item?id=46136026

www.facebook.com/security/advisories/cve-2025-55182

react.dev/...curity-vulnerability-in-react-server-components

cve.org (CVE-2025-55182)

nvd.nist.gov (CVE-2025-55182)

Download JSON