Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

New React RSC Vulnerabilities Enable DoS and Source Code Exposure

Posted on December 12, 2025December 12, 2025 By CWS

Dec 12, 2025Ravie LakshmananSoftware Safety / Vulnerability
The React workforce has launched fixes for 2 new varieties of flaws in React Server Elements (RSC) that, if efficiently exploited, may end in denial-of-service (DoS) or supply code publicity.
The workforce mentioned the problems have been discovered by the safety neighborhood whereas trying to use the patches launched for CVE-2025-55182 (CVSS rating: 10.0), a essential bug in RSC that has since been weaponized within the wild.
The three vulnerabilities are listed under –

CVE-2025-55184 (CVSS rating: 7.5) – A pre-authentication denial of service vulnerability arising from unsafe deserialization of payloads from HTTP requests to Server Perform endpoints, triggering an infinite loop that hangs the server course of and will forestall future HTTP requests from being served
CVE-2025-67779 (CVSS rating: 7.5) – An incomplete repair for CVE-2025-55184 that has the identical affect
CVE-2025-55183 (CVSS rating: 5.3) – An data leak vulnerability that will trigger a particularly crafted HTTP request despatched to a weak Server Perform to return the supply code of any Server Perform

Nonetheless, profitable exploitation of CVE-2025-55183 requires the existence of a Server Perform that explicitly or implicitly exposes an argument that has been transformed right into a string format.

The issues affecting the next variations of react-server-dom-parcel, react-server-dom-turbopack, and react-server-dom-webpack –

CVE-2025-55184 and CVE-2025-55183 – 19.0.0, 19.0.1 19.1.0, 19.1.1, 19.1.2, 19.2.0 and 19.2.1
CVE-2025-67779 – 19.0.2, 19.1.3 and 19.2.2

Safety researcher RyotaK and Shinsaku Nomura have been credited with reporting the 2 DoS bugs to the Meta Bug Bounty program, whereas Andrew MacPherson has been acknowledged for reporting the knowledge leak flaw.
Customers are suggested to replace to variations 19.0.3, 19.1.4, and 19.2.3 as quickly as potential, significantly in mild of lively exploration of CVE-2025-55182.
“When a essential vulnerability is disclosed, researchers scrutinize adjoining code paths searching for variant exploit strategies to check whether or not the preliminary mitigation could be bypassed,” the React workforce mentioned. “This sample exhibits up throughout the business, not simply in JavaScript. Further disclosures could be irritating, however they’re usually an indication of a wholesome response cycle.”

The Hacker News Tags:Code, DoS, Enable, Exposure, React, RSC, Source, Vulnerabilities

Post navigation

Previous Post: $320,000 Paid Out at Zeroday.Cloud for Open Source Software Exploits
Next Post: Apache Struts 2 DoS Vulnerability Let Attackers Crash Server

Related Posts

ConnectWise to Rotate ScreenConnect Code Signing Certificates Due to Security Risks The Hacker News
China-Linked Hackers Launch Targeted Espionage Campaign on African IT Infrastructure The Hacker News
Why Your Security Culture is Critical to Mitigating Cyber Risk The Hacker News
South Asian Ministries Hit by SideWinder APT Using Old Office Flaws and Custom Malware The Hacker News
Transparent Tribe Targets Indian Govt With Weaponized Desktop Shortcuts via Phishing The Hacker News
VPN 0-Day, Encryption Backdoor, AI Malware, macOS Flaw, ATM Hack & More The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Policy, Isolation, and Data Controls That Actually Work
  • Ashen Lepus Hacker Group Attacks Eastern Diplomatic Entities With New AshTag Malware
  • Apache Struts 2 DoS Vulnerability Let Attackers Crash Server
  • New React RSC Vulnerabilities Enable DoS and Source Code Exposure
  • $320,000 Paid Out at Zeroday.Cloud for Open Source Software Exploits

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Policy, Isolation, and Data Controls That Actually Work
  • Ashen Lepus Hacker Group Attacks Eastern Diplomatic Entities With New AshTag Malware
  • Apache Struts 2 DoS Vulnerability Let Attackers Crash Server
  • New React RSC Vulnerabilities Enable DoS and Source Code Exposure
  • $320,000 Paid Out at Zeroday.Cloud for Open Source Software Exploits

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark