Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
New Vulnerabilities in React Server Components Allow DoS Attacks and Source Code Leaks

New Vulnerabilities in React Server Components Allow DoS Attacks and Source Code Leaks

Posted on December 12, 2025December 12, 2025 By CWS

Lower than every week after addressing a important Distant Code Execution (RCE) vulnerability, the React staff has disclosed three extra safety flaws affecting React Server Elements (RSC).

Safety researchers found these new points whereas trying to bypass the mitigations for the earlier “React2Shell” exploit.

Whereas the unique RCE patch stays efficient, the newly found vulnerabilities introduce dangers relating to Denial-of-Service (DoS) and the unauthorized publicity of server-side supply code.

The React staff emphasizes that earlier updates (variations 19.0.2, 19.1.3, and 19.2.2) contained an incomplete repair, necessitating a right away second improve.

Probably the most extreme of the brand new flaws (rated Excessive Severity) includes a Denial-of-Service vector. Researchers discovered {that a} malicious HTTP request despatched to a Server Features endpoint can set off an infinite loop throughout React’s deserialization course of.

This causes the server course of to hold and consumes out there CPU assets, successfully taking the applying offline.

A separate Medium Severity subject permits attackers to control HTTP requests to leak the supply code of Server Features. Whereas runtime secrets and techniques (like surroundings variables) stay safe, any hardcoded secrets and techniques or logic inside the operate might be uncovered.

The vulnerabilities are tracked below the next identifiers:

CVE IDVulnerability TypeSeverityCVSS ScoreCVE-2025-55184Denial of ServiceHigh7.5CVE-2025-67779Denial of Service (Patch Bypass)High7.5CVE-2025-55183Source Code ExposureMedium5.3

Affected Variations

These vulnerabilities have an effect on the react-server-dom-webpack, react-server-dom-parcel, and react-server-dom-turbopack packages. Customers of frameworks equivalent to Subsequent.js, Waku, and React Router are probably impacted.

The preliminary patches launched earlier this week have been incomplete. If you’re at present operating variations 19.0.2, 19.1.3, or 19.2.2, you stay susceptible to the DoS exploit (CVE-2025-67779).

Builders should improve to the next “protected” variations instantly:

19.0.x department: Improve to 19.0.3

19.1.x department: Improve to 19.1.4

19.2.x department: Improve to 19.2.3

The React staff famous that discovering follow-up vulnerabilities is widespread after a high-profile disclosure, drawing parallels to the “Log4Shell” incident, the place group probing uncovered adjoining flaws. Credit score for these discoveries goes to researchers Andrew MacPherson, RyotaK, and Shinsaku Nomura.

Comply with us on Google Information, LinkedIn, and X for every day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Attacks, Code, Components, DoS, Leaks, React, Server, Source, Vulnerabilities

Post navigation

Previous Post: Developers Frustrated by ‘No Server Available’ Message
Next Post: Trump Signs Executive Order to Block State AI Regulations

Related Posts

New FileFix Attack Abuses Windows File Explorer to Execute Malicious Commands New FileFix Attack Abuses Windows File Explorer to Execute Malicious Commands Cyber Security News
New GhostSocks Malware-as-a-Service Enables Threat Actors to Convert Compromised Devices into Proxies New GhostSocks Malware-as-a-Service Enables Threat Actors to Convert Compromised Devices into Proxies Cyber Security News
Hackers Abusing GitHub Notifications to Deliver Phishing Emails Hackers Abusing GitHub Notifications to Deliver Phishing Emails Cyber Security News
Top 10 High-Risk Vulnerabilities Of 2025 that Exploited in the Wild Top 10 High-Risk Vulnerabilities Of 2025 that Exploited in the Wild Cyber Security News
Authorities Dismanteled Major Credit Card Fraud Operation Impacting 4.3 Million Cardholders Authorities Dismanteled Major Credit Card Fraud Operation Impacting 4.3 Million Cardholders Cyber Security News
Hackers Could Take Control of Car Dashboard by Hacking Its Modem Hackers Could Take Control of Car Dashboard by Hacking Its Modem Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News