⚠️ Critical RCE Vulnerability in React Server Components (CVSS 10.0)
Source: Dev.to

🚨 Why this vulnerability matters
React Server Components introduce a hybrid rendering model where the server returns component trees to the client. The disclosed vulnerability allows malicious actors to abuse this protocol and inject payloads that get executed server‑side, leading to:
- Full server compromise
- Access to environment variables
- Supply‑chain risk via poisoned responses
- Lateral movement inside the infrastructure
This is one of the most severe RSC‑related issues ever published.
⚠️ Affected technologies
React Server Components packages
| Status | Versions |
|---|---|
| Vulnerable | 19.0, 19.1.0, 19.1.1, 19.2.0 |
| Patched | 19.0.1, 19.1.2, 19.2.1+ |
Next.js with App Router
Next.js uses RSC under the hood, making it affected by default when using the /app directory.
Vulnerable versions
| Next.js version |
|---|
| 15.x |
| 16.x (various releases) |
Patched versions
| Secure version |
|---|
| 15.0.5 |
| 15.1.9 |
| 15.2.6 |
| 15.3.6 |
| 15.4.8 |
| 15.5.7 |
| 16.0.7 |
🔧 Required actions (immediate)
Upgrade React RSC packages to one of the secure versions:
19.0.1,19.1.2,19.2.1, or later.
Upgrade Next.js to a patched version listed above.
After updating dependencies:
- Rebuild and redeploy all affected applications.
- Rotate secrets/credentials if your service was deployed with vulnerable versions.
- (Recommended) Review logs for suspicious RSC request patterns.
🔍 How to check if your project is affected
For React projects
npm ls react-server react-server-dom-webpack
Or inspect package.json / pnpm-lock.yaml for the vulnerable versions listed above.
For Next.js projects
npx next info
Check whether:
- You’re using the App Router (
/appdirectory) - Your Next.js version falls within the vulnerable range
📌 Applicability
This advisory applies to:
- Projects built on React that use RSC
- Projects built on Next.js App Router
- Any backend that processes RSC protocol traffic
It does not impact traditional React applications that do not use RSC.
🔥 Final notes
This vulnerability is a rare case where React’s server‑side infrastructure becomes an attack vector with zero‑authentication, remote exploitability, and full server compromise potential.
If your team maintains applications using RSC or Next.js App Router, treat these updates as urgent.
Stay safe and patch early.
React Team — “Critical Security Vulnerability in React Server Components (CVE‑2025‑55182)”
https://react.dev/blog/2025/12/03/critical-security-vulnerability-in-react-server-components