Article Details
Scrape Timestamp (UTC): 2025-12-03 21:57:29.988
Source: https://www.theregister.com/2025/12/03/exploitation_is_imminent_react_vulnerability/
Original Article Text
Click to Toggle View
'Exploitation is imminent' as 39 percent of cloud environs have max-severity React hole. Finish reading this, then patch. A maximum-severity flaw in the widely used JavaScript library React, and several React-based frameworks including Next.js allows unauthenticated, remote attackers to execute malicious code on vulnerable instances. The flaw is easy to abuse, and mass exploitation is "imminent," according to security researchers. The React team disclosed the unauthenticated remote code execution (RCE) vulnerability in React Server Components on Wednesday. It's tracked as CVE-2025-55182 and received a maximum 10.0 CVSS severity rating. This is a big deal because much of the internet is built on React – one estimate suggests 39 percent of cloud environments are vulnerable to this flaw. This issue therefore deserves a prominent place on your to-do list. The bug affects versions 19.0, 19.1.0, 19.1.1, and 19.2.0 of: It also affects the default configuration of several React frameworks and bundlers including next, react-router, waku, @parcel/rsc, @vitejs/plugin-rsc, and rwsdk. The project's maintainers say upgrading to versions 19.0.1, 19.1.2, and 19.2.1 fixes the flaw. "We recommend upgrading immediately," the React team said in a Wednesday security advisory. "CVE-2025-55182 represents a major risk to users of one of the world's most widely used web application frameworks," Benjamin Harris, founder and CEO of exposure management tools vendor watchTowr, told The Register. "Exploitation requires few prerequisites [and] there should be no doubt that in-the-wild exploitation is imminent as soon as attackers begin analyzing now-public patches." Vercel, the creator and primary maintainer of Next.js, assigned its own CVE (CVE-2025-66478) for the flaw, and issued an alert and patch on Wednesday, too. While we don't have too many details about the vulnerability, we know it abuses a flaw in how React decodes payloads sent to React Server Function endpoints. "An unauthenticated attacker could craft a malicious HTTP request to any Server Function endpoint that, when deserialized by React, achieves remote code execution on the server," the security alert warned. "Further details of the vulnerability will be provided after the rollout of the fix is complete." Researcher Lachlan Davidson found and reported the flaw to Meta, which created the open source project, on Saturday. Meta worked with the React team to quickly roll out an emergency patch just four days later. React is very widely used – Meta's Facebook and Instagram, Netflix, Airbnb, Shopify, Hello Fresh, Walmart, and Asana rely on it, as do millions of developers – and many frameworks depend on vulnerable React packages. This CVE therefore puts much of the internet at risk. "Wiz data indicates that 39 percent of cloud environments contain instances of Next.js or React in versions vulnerable to CVE-2025-55182 and/or CVE-2025-66478," the cloud security shop's threat hunters Gili Tikochinski, Merav Bar, and Danielle Aminov said on Wednesday. The soon-to-be-Google-owned biz experimented with the flaw and fix, and reported that "exploitation of this vulnerability had high fidelity, with a near 100 percent success rate and can be leveraged to a full remote code execution." "Due to the high severity and the ease of exploitation, immediate patching is required," the trio added. At the time of writing, The Register could find no reports of in-the-wild exploitation. However it is safe to assume that criminals are already reverse engineering patches and scanning the internet for exposed, vulnerable instances. "Due to the widespread use of React and frameworks like Next.js that are built on top of it, this vulnerability is expected to draw significant attention," Stephen Fewer, senior principal researcher at Rapid7, told The Register. "The chances of technical details and exploit code being made publicly available are high, so exploitation is likely to occur soon," he said. "It is therefore critical to patch this vulnerability immediately." Cloudflare customers may also wish to dig into the company’s claim that its Web Application Firewall (WAF) protects them from the flaw, if their React application traffic is proxied through the WAF.
Daily Brief Summary
A severe vulnerability in the React JavaScript library, CVE-2025-55182, enables unauthenticated remote code execution, affecting 39% of cloud environments using React and related frameworks.
The flaw impacts React versions 19.0, 19.1.0, 19.1.1, and 19.2.0, as well as frameworks like Next.js, with exploitation likely imminent due to ease of abuse.
The React team has released patches for affected versions, urging immediate upgrades to mitigate potential exploitation risks.
Vercel, maintainer of Next.js, issued its own CVE (CVE-2025-66478) and corresponding patch, emphasizing the critical nature of this security threat.
The vulnerability arises from improper decoding of payloads in React Server Function endpoints, allowing crafted HTTP requests to execute malicious code.
Meta and the React team responded swiftly, deploying an emergency patch within four days of the flaw's disclosure by researcher Lachlan Davidson.
Organizations using React are advised to apply patches immediately, as the vulnerability's widespread impact and ease of exploitation pose significant security risks.
Cloudflare's Web Application Firewall may offer some protection, but direct patching remains essential to safeguard against potential attacks.