Critical RCE Vulnerabilities in React and Next.js Expose Millions

React security Next.js vulnerabilities RCE vulnerability CVE-2025-55182 CVE-2025-66478 React Native CLI vulnerability Zero-Trust security
Divyansh Ingle
Divyansh Ingle

Head of Engineering

 
December 4, 2025 3 min read
Critical RCE Vulnerabilities in React and Next.js Expose Millions

TL;DR

This article details critical unauthenticated Remote Code Execution (RCE) vulnerabilities impacting React and Next.js through their Server Components (RSC) protocol, and a separate flaw in the React Native CLI. It explores the technical root causes, affected versions, and provides actionable steps for developers and security teams to patch these vulnerabilities and secure their applications against exploitation.

Critical RCE Vulnerabilities Impact React and Next.js

React and Next.js are facing critical unauthenticated Remote Code Execution (RCE) vulnerabilities, identified as CVE-2025-55182 and CVE-2025-66478. Immediate patching is crucial to mitigate these risks.

Technical Breakdown of the Vulnerabilities

The core issue lies within the React Server Components (RSC) "Flight" protocol. CVE-2025-55182 affects the react-server package, while CVE-2025-66478 impacts Next.js due to its implementation of the RSC "Flight" protocol. The vulnerability is rooted in insecure deserialization, where the server unsafely processes RSC payloads. A malformed payload can allow attacker-controlled data to manipulate server-side execution, leading to the execution of privileged JavaScript code. Exploitation has demonstrated a near 100% success rate via crafted HTTP requests.

The root cause is the server deserializing untrusted input directly into module and export name lookups, without proper verification.

return moduleExports[metadata.name]

The fix involves checking for own properties to prevent access to prototype-level properties:

  if (hasOwnProperty.call(moduleExports, metadata.name)) {
    return moduleExports[metadata.name];
  }
  return (undefined: any);

This issue highlights the risks of implicit RPC layers, as opposed to explicit frameworks like gRPC or SOAP that use schemas and service definitions to prevent boundary confusion.

Impacted Products and Versions

The following products and versions are affected:

  • react-server-dom: Versions 19.0.0, 19.1.0, 19.1.1, and 19.2.0
  • Next.js: Versions 14.3.0-canary, 15.x, and 16.x (App Router)

Patched releases are available:

  • react-server-dom: 19.0.1, 19.1.2, and 19.2.1
  • Next.js: 14.3.0-canary.88, 15.0.5, 15.1.9, 15.2.6, 15.3.6, 15.4.8, 15.5.7, 16.0.7

Other potentially affected frameworks and libraries include:

Recommended Actions for Security Teams

  1. Upgrade React and Next.js: Apply the hardened versions immediately.
  2. Check Other RSC Frameworks: If using other RSC-enabled frameworks, check for updates regarding the bundled react-server version.

React Native CLI Vulnerability

A separate critical vulnerability (CVE-2025-11953) has been identified in the @react-native-community/cli package. This flaw allows remote unauthenticated attackers to execute arbitrary OS commands on the machine running the development server.

React Native CLI Flaw

Image courtesy of The Hacker News

The vulnerability affects versions 4.8.0 through 20.0.0-alpha.2 of the @react-native-community/cli-server-api package. The issue stems from the Metro development server binding to external interfaces by default and exposing an "/open-url" endpoint susceptible to OS command injection.

The server's /open-url endpoint handles POST requests, passing user-input values to the unsafe open() function from the open NPM package, leading to OS command execution.

Mitigation Steps for React Native CLI Vulnerability

  1. Update the CLI: Upgrade to @react-native-community/cli-server-api version 20.0.0 or later.
  2. Bind to Localhost: As a temporary mitigation, bind the development server to localhost using the command npx react-native start –host 127.0.0.1.

Gopher Security: Securing Your Applications with Zero-Trust Architecture

These vulnerabilities highlight the importance of robust security measures in modern application development. At Gopher Security, we specialize in AI-powered, post-quantum Zero-Trust cybersecurity architecture, converging networking and security across all environments. Our platform uses peer-to-peer encrypted tunnels and quantum-resistant cryptography to protect your applications from evolving threats.

To learn more about how Gopher Security can help secure your applications, visit https://gopher.security or contact our team for a consultation.

Divyansh Ingle
Divyansh Ingle

Head of Engineering

 

AI and cybersecurity expert with 15-year large scale system engineering experience. Great hands-on engineering director.

Related News

AI-Driven Cybersecurity Innovations: The Future of Threat Prevention
AI agents security

AI-Driven Cybersecurity Innovations: The Future of Threat Prevention

AI agents are prime targets for cyberattacks. Discover evolving threats like prompt injection & AI-powered exploits, and learn how to fortify your defenses. Read now!

By Brandon Woo January 22, 2026 5 min read
common.read_full_article
GootLoader Malware Evades Detection Using Nested ZIP Archives
GootLoader

GootLoader Malware Evades Detection Using Nested ZIP Archives

GootLoader is back with advanced tricks, using malformed ZIPs to bypass security & target businesses. Learn how to detect and defend against this threat. Protect your assets!

By Edward Zhou January 21, 2026 3 min read
common.read_full_article
WhisperPair Vulnerability: Millions of Bluetooth Devices at Risk
WhisperPair attack

WhisperPair Vulnerability: Millions of Bluetooth Devices at Risk

Millions of Bluetooth audio devices are at risk from the WhisperPair vulnerability. Learn how attackers can eavesdrop and track your devices, and what you can do to protect yourself. Update your firmware now!

By Jim Gagnard January 20, 2026 3 min read
common.read_full_article
Tech Hiring Growth: 12-15% Increase in AI and Data Jobs by 2026
India tech job market

Tech Hiring Growth: 12-15% Increase in AI and Data Jobs by 2026

India's tech job market is set for a 12-15% surge in 2026, creating 1.25 lakh roles. Discover key sectors and skills in demand. Read more!

By Edward Zhou January 19, 2026 3 min read
common.read_full_article