Critical RCE Vulnerabilities in React and Next.js Expose Millions

React security Next.js vulnerabilities RCE vulnerability CVE-2025-55182 CVE-2025-66478 React Native CLI vulnerability Zero-Trust security
Divyansh Ingle
Divyansh Ingle

Head of Engineering

 
December 4, 2025 3 min read
Critical RCE Vulnerabilities in React and Next.js Expose Millions

TL;DR

This article details critical unauthenticated Remote Code Execution (RCE) vulnerabilities impacting React and Next.js through their Server Components (RSC) protocol, and a separate flaw in the React Native CLI. It explores the technical root causes, affected versions, and provides actionable steps for developers and security teams to patch these vulnerabilities and secure their applications against exploitation.

Critical RCE Vulnerabilities Impact React and Next.js

React and Next.js are facing critical unauthenticated Remote Code Execution (RCE) vulnerabilities, identified as CVE-2025-55182 and CVE-2025-66478. Immediate patching is crucial to mitigate these risks.

Technical Breakdown of the Vulnerabilities

The core issue lies within the React Server Components (RSC) "Flight" protocol. CVE-2025-55182 affects the react-server package, while CVE-2025-66478 impacts Next.js due to its implementation of the RSC "Flight" protocol. The vulnerability is rooted in insecure deserialization, where the server unsafely processes RSC payloads. A malformed payload can allow attacker-controlled data to manipulate server-side execution, leading to the execution of privileged JavaScript code. Exploitation has demonstrated a near 100% success rate via crafted HTTP requests.

The root cause is the server deserializing untrusted input directly into module and export name lookups, without proper verification.

return moduleExports[metadata.name]

The fix involves checking for own properties to prevent access to prototype-level properties:

  if (hasOwnProperty.call(moduleExports, metadata.name)) {
    return moduleExports[metadata.name];
  }
  return (undefined: any);

This issue highlights the risks of implicit RPC layers, as opposed to explicit frameworks like gRPC or SOAP that use schemas and service definitions to prevent boundary confusion.

Impacted Products and Versions

The following products and versions are affected:

  • react-server-dom: Versions 19.0.0, 19.1.0, 19.1.1, and 19.2.0
  • Next.js: Versions 14.3.0-canary, 15.x, and 16.x (App Router)

Patched releases are available:

  • react-server-dom: 19.0.1, 19.1.2, and 19.2.1
  • Next.js: 14.3.0-canary.88, 15.0.5, 15.1.9, 15.2.6, 15.3.6, 15.4.8, 15.5.7, 16.0.7

Other potentially affected frameworks and libraries include:

Recommended Actions for Security Teams

  1. Upgrade React and Next.js: Apply the hardened versions immediately.
  2. Check Other RSC Frameworks: If using other RSC-enabled frameworks, check for updates regarding the bundled react-server version.

React Native CLI Vulnerability

A separate critical vulnerability (CVE-2025-11953) has been identified in the @react-native-community/cli package. This flaw allows remote unauthenticated attackers to execute arbitrary OS commands on the machine running the development server.

React Native CLI Flaw

Image courtesy of The Hacker News

The vulnerability affects versions 4.8.0 through 20.0.0-alpha.2 of the @react-native-community/cli-server-api package. The issue stems from the Metro development server binding to external interfaces by default and exposing an "/open-url" endpoint susceptible to OS command injection.

The server's /open-url endpoint handles POST requests, passing user-input values to the unsafe open() function from the open NPM package, leading to OS command execution.

Mitigation Steps for React Native CLI Vulnerability

  1. Update the CLI: Upgrade to @react-native-community/cli-server-api version 20.0.0 or later.
  2. Bind to Localhost: As a temporary mitigation, bind the development server to localhost using the command npx react-native start –host 127.0.0.1.

Gopher Security: Securing Your Applications with Zero-Trust Architecture

These vulnerabilities highlight the importance of robust security measures in modern application development. At Gopher Security, we specialize in AI-powered, post-quantum Zero-Trust cybersecurity architecture, converging networking and security across all environments. Our platform uses peer-to-peer encrypted tunnels and quantum-resistant cryptography to protect your applications from evolving threats.

To learn more about how Gopher Security can help secure your applications, visit https://gopher.security or contact our team for a consultation.

Divyansh Ingle
Divyansh Ingle

Head of Engineering

 

AI and cybersecurity expert with 15-year large scale system engineering experience. Great hands-on engineering director.

Related News

Critical Azure Entra ID Vulnerability Allows Tenant-Wide Compromise
Windows Admin Center vulnerability

Critical Azure Entra ID Vulnerability Allows Tenant-Wide Compromise

Urgent: Two critical vulnerabilities in Windows Admin Center (CVE-2026-20965) and Azure Entra ID (CVE-2025-55241) could lead to tenant-wide compromise. Learn how to protect your systems now!

By Alan V Gutnov January 15, 2026 5 min read
common.read_full_article
Advanced Linux VoidLink Malware: Targeting Cloud and Container Environments
VoidLink malware

Advanced Linux VoidLink Malware: Targeting Cloud and Container Environments

Discover VoidLink, a sophisticated Linux malware framework targeting cloud environments. Learn its stealthy tactics, modular design, and how to protect your infrastructure. Read now!

By Edward Zhou January 14, 2026 6 min read
common.read_full_article
Critical Apache Struts XXE Injection Vulnerability CVE-2025-68493
Apache Struts XXE

Critical Apache Struts XXE Injection Vulnerability CVE-2025-68493

Critical Apache Struts XXE vulnerability (CVE-2025-68493) with CVSS 9.8! Discover its impact on AI/MLOps and learn mitigation strategies. Secure your systems now!

By Divyansh Ingle January 13, 2026 4 min read
common.read_full_article
Apple Urges iPhone Users to Update for Critical Security Fixes
Apple security update

Apple Urges iPhone Users to Update for Critical Security Fixes

Apple releases urgent security updates for iOS, iPadOS, and more to patch actively exploited zero-day flaws. Update now to protect your devices!

By Brandon Woo January 12, 2026 3 min read
common.read_full_article