Critical RCE Vulnerabilities in React and Next.js Expose Millions

React security Next.js vulnerabilities RCE vulnerability CVE-2025-55182 CVE-2025-66478 React Native CLI vulnerability Zero-Trust security
Divyansh Ingle
Divyansh Ingle

Head of Engineering

 
December 4, 2025 3 min read
Critical RCE Vulnerabilities in React and Next.js Expose Millions

TL;DR

This article details critical unauthenticated Remote Code Execution (RCE) vulnerabilities impacting React and Next.js through their Server Components (RSC) protocol, and a separate flaw in the React Native CLI. It explores the technical root causes, affected versions, and provides actionable steps for developers and security teams to patch these vulnerabilities and secure their applications against exploitation.

Critical RCE Vulnerabilities Impact React and Next.js

React and Next.js are facing critical unauthenticated Remote Code Execution (RCE) vulnerabilities, identified as CVE-2025-55182 and CVE-2025-66478. Immediate patching is crucial to mitigate these risks.

Technical Breakdown of the Vulnerabilities

The core issue lies within the React Server Components (RSC) "Flight" protocol. CVE-2025-55182 affects the react-server package, while CVE-2025-66478 impacts Next.js due to its implementation of the RSC "Flight" protocol. The vulnerability is rooted in insecure deserialization, where the server unsafely processes RSC payloads. A malformed payload can allow attacker-controlled data to manipulate server-side execution, leading to the execution of privileged JavaScript code. Exploitation has demonstrated a near 100% success rate via crafted HTTP requests.

The root cause is the server deserializing untrusted input directly into module and export name lookups, without proper verification.

return moduleExports[metadata.name]

The fix involves checking for own properties to prevent access to prototype-level properties:

  if (hasOwnProperty.call(moduleExports, metadata.name)) {
    return moduleExports[metadata.name];
  }
  return (undefined: any);

This issue highlights the risks of implicit RPC layers, as opposed to explicit frameworks like gRPC or SOAP that use schemas and service definitions to prevent boundary confusion.

Impacted Products and Versions

The following products and versions are affected:

  • react-server-dom: Versions 19.0.0, 19.1.0, 19.1.1, and 19.2.0
  • Next.js: Versions 14.3.0-canary, 15.x, and 16.x (App Router)

Patched releases are available:

  • react-server-dom: 19.0.1, 19.1.2, and 19.2.1
  • Next.js: 14.3.0-canary.88, 15.0.5, 15.1.9, 15.2.6, 15.3.6, 15.4.8, 15.5.7, 16.0.7

Other potentially affected frameworks and libraries include:

Recommended Actions for Security Teams

  1. Upgrade React and Next.js: Apply the hardened versions immediately.
  2. Check Other RSC Frameworks: If using other RSC-enabled frameworks, check for updates regarding the bundled react-server version.

React Native CLI Vulnerability

A separate critical vulnerability (CVE-2025-11953) has been identified in the @react-native-community/cli package. This flaw allows remote unauthenticated attackers to execute arbitrary OS commands on the machine running the development server.

React Native CLI Flaw
Image courtesy of The Hacker News

The vulnerability affects versions 4.8.0 through 20.0.0-alpha.2 of the @react-native-community/cli-server-api package. The issue stems from the Metro development server binding to external interfaces by default and exposing an "/open-url" endpoint susceptible to OS command injection.

The server's /open-url endpoint handles POST requests, passing user-input values to the unsafe open() function from the open NPM package, leading to OS command execution.

Mitigation Steps for React Native CLI Vulnerability

  1. Update the CLI: Upgrade to @react-native-community/cli-server-api version 20.0.0 or later.
  2. Bind to Localhost: As a temporary mitigation, bind the development server to localhost using the command npx react-native start –host 127.0.0.1.

Gopher Security: Securing Your Applications with Zero-Trust Architecture

These vulnerabilities highlight the importance of robust security measures in modern application development. At Gopher Security, we specialize in AI-powered, post-quantum Zero-Trust cybersecurity architecture, converging networking and security across all environments. Our platform uses peer-to-peer encrypted tunnels and quantum-resistant cryptography to protect your applications from evolving threats.

To learn more about how Gopher Security can help secure your applications, visit https://gopher.security or contact our team for a consultation.

Divyansh Ingle
Divyansh Ingle

Head of Engineering

 

AI and cybersecurity expert with 15-year large scale system engineering experience. Great hands-on engineering director.

Related News

China Espionage Threat: BRICKSTORM Malware Targets Tech and Legal Sectors
BRICKSTORM malware

China Espionage Threat: BRICKSTORM Malware Targets Tech and Legal Sectors

Uncover the sophisticated BRICKSTORM malware campaign linked to China. Learn about its tactics, targets, and how to defend your organization. Read more!

By Jim Gagnard December 5, 2025 4 min read
Read full article
Combating Cyber Threats: Harnessing AI for Effective Defense
AI cybersecurity

Combating Cyber Threats: Harnessing AI for Effective Defense

Cyberattackers are leveraging AI for sophisticated threats. Discover how to defend your organization with AI-driven strategies and tools. Learn more at Gopher Security.

By Alan V Gutnov December 3, 2025 7 min read
Read full article
Google Patches 120 Android Vulnerabilities, 2 Zero-Days Fixed
Android security updates

Google Patches 120 Android Vulnerabilities, 2 Zero-Days Fixed

Google's latest Android security updates tackle critical vulnerabilities and actively exploited zero-days. Ensure your device is protected! Learn more.

By Alan V Gutnov December 2, 2025 2 min read
Read full article
Massive Password Breach: 1.3 Billion Credentials Exposed Online
password breach

Massive Password Breach: 1.3 Billion Credentials Exposed Online

A massive breach exposed 1.3B passwords. Learn how to check if you're affected and secure your accounts. Don't reuse passwords! Visit Gopher Security for advanced protection.

By Edward Zhou December 1, 2025 2 min read
Read full article