Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Critical RSC Bugs in React and Next.js Allow Unauthenticated Remote Code Execution

Critical RSC Bugs in React and Next.js Allow Unauthenticated Remote Code Execution

Posted on December 3, 2025December 3, 2025 By CWS

Dec 03, 2025Ravie LakshmananVulnerability / Cloud Safety
A maximum-severity safety flaw has been disclosed in React Server Elements (RSC) that, if efficiently exploited, might end in distant code execution.
The vulnerability, tracked as CVE-2025-55182, carries a CVSS rating of 10.0.
It permits “unauthenticated distant code execution by exploiting a flaw in how React decodes payloads despatched to React Server Operate endpoints,” the React Staff stated in an alert issued right now.
“Even when your app doesn’t implement any React Server Operate endpoints, it might nonetheless be susceptible in case your app helps React Server Elements.”
In response to cloud safety agency Wiz, the problem is a case of logical deserialization that stems from processing RSC payloads in an unsafe method. Consequently, an unauthenticated attacker might craft a malicious HTTP request to any Server Operate endpoint that, when deserialized by React, achieves execution of arbitrary JavaScript code on the server.

The vulnerability impacts variations 19.0, 19.1.0, 19.1.1, and 19.2.0 of the next npm packages –

react-server-dom-webpack
react-server-dom-parcel
react-server-dom-turbopack

It has been addressed in variations 19.0.1, 19.1.2, and 19.2.1. New Zealand-based safety researcher Lachlan Davidson has been credited with discovering and reporting the flaw on November 29, 2025.
It is price noting that the vulnerability additionally impacts Subsequent.js utilizing App Router. The difficulty has been assigned the CVE identifier CVE-2025-66478 (CVSS rating: 10.0). It impacts variations >=14.3.0-canary.77, >=15, and >=16. Patched variations are 16.0.7, 15.5.7, 15.4.8, 15.3.6, 15.2.6, 15.1.9, and 15.0.5.
That stated, any library that bundles RSC is more likely to be affected by the flaw. This contains, however shouldn’t be restricted to, Vite RSC plugin, Parcel RSC plugin, React Router RSC preview, RedwoodJS, and Waku.
Wiz stated 39% of cloud environments have situations susceptible to CVE-2025-55182 and/or CVE-2025-66478. In mild of the severity of the vulnerability, it is suggested that customers apply the fixes as quickly as potential for optimum safety.

The Hacker News Tags:Bugs, Code, Critical, Execution, Next.js, React, Remote, RSC, Unauthenticated

Post navigation

Previous Post: Longwatch RCE Vulnerability Let Attackers Execute Remote Code With Elevated Privileges
Next Post: India’s New SIM-Binding Rule for WhatsApp, Signal, Telegram, and Other Messaging Platforms

Related Posts

Malicious PyPI Package Posing as Solana Tool Stole Source Code in 761 Downloads Malicious PyPI Package Posing as Solana Tool Stole Source Code in 761 Downloads The Hacker News
Scattered Spider Arrests, Car Exploits, macOS Malware, Fortinet RCE and More Scattered Spider Arrests, Car Exploits, macOS Malware, Fortinet RCE and More The Hacker News
Linux Malware Delivered via Malicious RAR Filenames Evades Antivirus Detection Linux Malware Delivered via Malicious RAR Filenames Evades Antivirus Detection The Hacker News
Badges, Bytes and Blackmail Badges, Bytes and Blackmail The Hacker News
VirusTotal Finds 44 Undetected SVG Files Used to Deploy Base64-Encoded Phishing Pages VirusTotal Finds 44 Undetected SVG Files Used to Deploy Base64-Encoded Phishing Pages The Hacker News
Microsoft OneDrive File Picker Flaw Grants Apps Full Cloud Access — Even When Uploading Just One File Microsoft OneDrive File Picker Flaw Grants Apps Full Cloud Access — Even When Uploading Just One File The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News