‘Nasty’ React Vulnerability Affects 39% of Cloud Environments

‘Nasty’ React Vulnerability Affects 39% of Cloud Environments

Updated on 04 Dec 2025 Category: Technology

A CVSS 10 rate critical vulnerability impacts React Server Components in versions 19.0–19.2.0. A patched update has been released.


A major flaw in one of the web’s most widely used frameworks has triggered an urgent security scramble.
A critical vulnerability in React Server Components — CVE-2025-55182 — allows attackers to run unauthenticated remote code execution by exploiting a flaw in how React decodes payloads sent to React Server Function endpoints.
The threat is rated a maximum of 10 on the CVSS (Common Vulnerability Scoring System).
This indicates a high-impact vulnerability that requires no authentication or user interaction and can be exploited remotely — granting complete control over the targeted server.
The vulnerable packages are react-server-dom-webpack, react-server-dom-parcel, and react-server-dom-turbopack in versions 19.0, 19.1.0, 19.1.1, and 19.2.0.
Popular frameworks, including Next.js, React Router, Vite RSC, Parcel RSC, Redwood, and Wak, rely on these packages and must be updated.
However, patched versions with the fixes — 19.0.1, 19.1.2, and 19.2.1 are available. For more details on the vulnerability, users can refer to the React Foundation documentation.
Cybersecurity firm Wiz reports that 39% of cloud environments contain vulnerable instances. Their analysis shows how widespread the exposure is. Next.js appears in 69% of all cloud environments, and 61% of those use it for publicly accessible applications.
In effect, roughly 44% of all cloud environments have publicly exposed Next.js deployments that fall within the vulnerable range.
“Due to the high severity and the ease of exploitation, immediate patching is required.”
Wiz’s experimentation found that exploitation of this vulnerability had high fidelity, “with a near 100% success rate and can be leveraged to full remote code execution.”
Hosting providers like Cloudflare and Vercel implemented emergency mitigations. “This is a very nasty vulnerability,” said Matthew Prince, CEO of Cloudflare, in a post on X.
Regardless of any temporary mitigations deployed by hosting providers, the React Foundation stresses that developers must update to the patched versions immediately.
“Further details of the vulnerability will be provided after the rollout of the fix is complete,” said React Foundation.

Source: Analytics India Magazine   •   04 Dec 2025

Related Articles

iPhone Liquid Glass UI designer Alan Dye leaves Apple, to join Meta as chief design officer
iPhone Liquid Glass UI designer Alan Dye leaves Apple, to join Meta as chief design officer

Alan Dye, Apple’s lead user interface designer, is moving to Meta as Chief Design Officer. Apple has already named Stephen Lemay, a …

Source: India Today | 04 Dec 2025
Resident Evil Requiem Gameplay Reveals Zombie Combat In Creepy New Setting
Resident Evil Requiem Gameplay Reveals Zombie Combat In Creepy New Setting

New Resident Evil Requiem gameplay has been revealed from a Japanese TV feature on the series, revealing combat against zombies.

Source: PlayStation Universe | 04 Dec 2025
Critical RSC Bugs in React and Next.js Allow Unauthenticated Remote Code Execution
Critical RSC Bugs in React and Next.js Allow Unauthenticated Remote Code Execution

Critical RSC flaws in React and Next.js enable unauthenticated remote code execution; users should update to patched versions now.

Source: The Hacker News | 04 Dec 2025
← Back to Home

QR Code Generator