cisco-sa-react-flight-TYw32Ddb Critical

Remote Code Execution Vulnerability in React and Next.js Frameworks: December 2025

Cisco Released: January 22, 2026 Updated: January 22, 2026 Restart Required

Description

<p>On December 3, 2025, the React team released a security advisory regarding a vulnerability, CVE-2025-55182, in the React server that could allow an unauthenticated, remote attacker to perform remote code execution on an affected device or system.</p> <p>For a description of this vulnerability, see the <a href="https://react.dev/blog/2025/12/03/critical-security-vulnerability-in-react-server-components" target="_blank" rel="noopener">public React Security Advisory</a>.</p> <p>Cisco's standard practice is to update integrated third-party software components to later versions as they become available.</p> <p>This advisory is available at the following link:<br><a href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-react-flight-TYw32Ddb">https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-react-flight-TYw32Ddb</a></p> <br/>Security Impact Rating: Critical <br/>CVE: CVE-2025-55182

Fixed Vulnerabilities 1

CVE-2025-55182 N/A 0.8 ⚠️ KEV fixed
Dec 03, 2025

A pre-authentication remote code execution vulnerability exists in React Server Components versions 19.0.0, 19.1.0, 19.1.1, and 19.2.0 including the following packages: react-server-dom-parcel, react-server-dom-turbopack, and react-server-dom-webpack.…

Quick Info

Patch ID: cisco-sa-react-flight-TYw32Ddb
Vendor: Cisco
Severity: Critical
CVEs Fixed: 1
Restart: Required

Vendor

Cisco

Additional Info

advisory id: cisco-sa-react-flight-TYw32Ddb

Share