Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
New React RSC Vulnerabilities Enable DoS and Source Code Exposure

New React RSC Vulnerabilities Enable DoS and Source Code Exposure

Posted on December 12, 2025December 12, 2025 By CWS

Dec 12, 2025Ravie LakshmananSoftware Safety / Vulnerability
The React workforce has launched fixes for 2 new varieties of flaws in React Server Elements (RSC) that, if efficiently exploited, may end in denial-of-service (DoS) or supply code publicity.
The workforce mentioned the problems have been discovered by the safety neighborhood whereas trying to use the patches launched for CVE-2025-55182 (CVSS rating: 10.0), a essential bug in RSC that has since been weaponized within the wild.
The three vulnerabilities are listed under –

CVE-2025-55184 (CVSS rating: 7.5) – A pre-authentication denial of service vulnerability arising from unsafe deserialization of payloads from HTTP requests to Server Perform endpoints, triggering an infinite loop that hangs the server course of and will forestall future HTTP requests from being served
CVE-2025-67779 (CVSS rating: 7.5) – An incomplete repair for CVE-2025-55184 that has the identical affect
CVE-2025-55183 (CVSS rating: 5.3) – An data leak vulnerability that will trigger a particularly crafted HTTP request despatched to a weak Server Perform to return the supply code of any Server Perform

Nonetheless, profitable exploitation of CVE-2025-55183 requires the existence of a Server Perform that explicitly or implicitly exposes an argument that has been transformed right into a string format.

The issues affecting the next variations of react-server-dom-parcel, react-server-dom-turbopack, and react-server-dom-webpack –

CVE-2025-55184 and CVE-2025-55183 – 19.0.0, 19.0.1 19.1.0, 19.1.1, 19.1.2, 19.2.0 and 19.2.1
CVE-2025-67779 – 19.0.2, 19.1.3 and 19.2.2

Safety researcher RyotaK and Shinsaku Nomura have been credited with reporting the 2 DoS bugs to the Meta Bug Bounty program, whereas Andrew MacPherson has been acknowledged for reporting the knowledge leak flaw.
Customers are suggested to replace to variations 19.0.3, 19.1.4, and 19.2.3 as quickly as potential, significantly in mild of lively exploration of CVE-2025-55182.
“When a essential vulnerability is disclosed, researchers scrutinize adjoining code paths searching for variant exploit strategies to check whether or not the preliminary mitigation could be bypassed,” the React workforce mentioned. “This sample exhibits up throughout the business, not simply in JavaScript. Further disclosures could be irritating, however they’re usually an indication of a wholesome response cycle.”

The Hacker News Tags:Code, DoS, Enable, Exposure, React, RSC, Source, Vulnerabilities

Post navigation

Previous Post: React2Shell Exploitation Escalates into Large-Scale Global Attacks, Forcing Emergency Mitigation
Next Post: Apache Struts 2 DoS Vulnerability Let Attackers Crash Server

Related Posts

Featured Chrome Browser Extension Caught Intercepting Millions of Users’ AI Chats Featured Chrome Browser Extension Caught Intercepting Millions of Users’ AI Chats The Hacker News
Mysterious ‘SmudgedSerpent’ Hackers Target U.S. Policy Experts Amid Iran–Israel Tensions Mysterious ‘SmudgedSerpent’ Hackers Target U.S. Policy Experts Amid Iran–Israel Tensions The Hacker News
Fortra Reveals Full Timeline of CVE-2025-10035 Exploitation Fortra Reveals Full Timeline of CVE-2025-10035 Exploitation The Hacker News
Zero-Day Exploits, Insider Threats, APT Targeting, Botnets and More Zero-Day Exploits, Insider Threats, APT Targeting, Botnets and More The Hacker News
Apple Zero-Click Flaw in Messages Exploited to Spy on Journalists Using Paragon Spyware Apple Zero-Click Flaw in Messages Exploited to Spy on Journalists Using Paragon Spyware The Hacker News
Why Business Impact Should Lead the Security Conversation Why Business Impact Should Lead the Security Conversation The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News