cisco-sa-react-flight-TYw32Ddb
Critical
Remote Code Execution Vulnerability in React and Next.js Frameworks: December 2025
Cisco
Released: January 22, 2026
Updated: January 22, 2026
Restart Required
Description
<p>On December 3, 2025, the React team released a security advisory regarding a vulnerability, CVE-2025-55182, in the React server that could allow an unauthenticated, remote attacker to perform remote code execution on an affected device or system.</p>
<p>For a description of this vulnerability, see the <a href="https://react.dev/blog/2025/12/03/critical-security-vulnerability-in-react-server-components" target="_blank" rel="noopener">public React Security Advisory</a>.</p>
<p>Cisco's standard practice is to update integrated third-party software components to later versions as they become available.</p>
<p>This advisory is available at the following link:<br><a href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-react-flight-TYw32Ddb">https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-react-flight-TYw32Ddb</a></p>
<br/>Security Impact Rating: Critical
<br/>CVE: CVE-2025-55182
Fixed Vulnerabilities 1
Dec 03, 2025
A pre-authentication remote code execution vulnerability exists in React Server Components versions 19.0.0, 19.1.0, 19.1.1, and 19.2.0 including the following packages: react-server-dom-parcel, react-server-dom-turbopack, and react-server-dom-webpack.…
Quick Info
Patch ID:
cisco-sa-react-flight-TYw32Ddb
Vendor:
Cisco
Severity:
Critical
CVEs Fixed:
1
Restart:
Required
Vendor
CiscoAdditional Info
advisory id:
cisco-sa-react-flight-TYw32Ddb
