⚠️ CISA Known Exploited Vulnerability
Active ThreatThis vulnerability is listed in CISA's Known Exploited Vulnerabilities (KEV) catalog. Active exploitation has been observed in the wild. This poses significant risk to federal enterprises and should be prioritized for immediate patching.
CVE-2025-55182
Critical CISA KEVVulnerability Description
A pre-authentication remote code execution vulnerability exists in React Server Components versions 19.0.0, 19.1.0, 19.1.1, and 19.2.0 including the following packages: react-server-dom-parcel, react-server-dom-turbopack, and react-server-dom-webpack. The vulnerable code unsafely deserializes payloads from HTTP requests to Server Function endpoints.
CVSS Metrics
Common Vulnerability Scoring System
Vector String:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Known Affected Software
7 configuration(s) from 2 vendor(s)
cpe:2.3:a:facebook:react:19.2.0:*:*:*:*:*:*:*
cpe:2.3:a:facebook:react:19.0.0:*:*:*:*:*:*:*
cpe:2.3:a:facebook:react:19.1.0:*:*:*:*:*:*:*
cpe:2.3:a:facebook:react:19.1.1:*:*:*:*:*:*:*
cpe:2.3:a:vercel:next.js:15.6.0:canary59:*:*:*:node.js:*:*
cpe:2.3:a:vercel:next.js:16.0.0:-:*:*:*:node.js:*:*
cpe:2.3:a:vercel:next.js:14.3.0:canary0:*:*:*:node.js:*:*
CPUAPR2026
Oracle Critical Patch Update Advisory - April 2026
cisco-sa-react-flight-TYw32Ddb
Remote Code Execution Vulnerability in React and Next.js Frameworks: December 2025
References & Resources
-
https://react.dev/blog/2025/12/03/critical-security-vulnerability-in-react-server-componentscve-assign@fb.com Patch Vendor Advisory
-
https://www.facebook.com/security/advisories/cve-2025-55182cve-assign@fb.com Vendor Advisory
-
http://www.openwall.com/lists/oss-security/2025/12/03/4af854a3a-2127-422b-91ae-364da2661108 Mailing List Patch Third Party Advisory
-
https://news.ycombinator.com/item?id=46136026af854a3a-2127-422b-91ae-364da2661108 Issue Tracking
-
https://aws.amazon.com/blogs/security/china-nexus-cyber-threat-groups-rapidly-exploit-react2shell-vulnerability-cve-2025-55182/134c704f-9b21-4f2e-91b3-4a467353bcc0 Third Party Advisory
-
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-55182134c704f-9b21-4f2e-91b3-4a467353bcc0 US Government Resource
Severity Details
CISA KEV Status
Listed in CISA's Known Exploited Vulnerabilities catalog
Weakness Type (CWE)
Deserialization of Untrusted Data
- Description
- The product deserializes untrusted data without sufficiently ensuring that the resulting data will be valid.
- Exploit Likelihood
- Medium
- Typical Severity
- Medium
- OWASP Top 10
- A08:2021-Software/Data Integrity Failures
- Abstraction Level
- Base
Key Information
- Published Date
- December 03, 2025
External Resources
Related News Articles
Latest news and updates about CVE-2025-55182
