Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
New React RSC Vulnerabilities Enable DoS and Source Code Exposure

New React RSC Vulnerabilities Enable DoS and Source Code Exposure

Posted on December 12, 2025December 12, 2025 By CWS

Dec 12, 2025Ravie LakshmananSoftware Safety / Vulnerability
The React workforce has launched fixes for 2 new varieties of flaws in React Server Elements (RSC) that, if efficiently exploited, may end in denial-of-service (DoS) or supply code publicity.
The workforce mentioned the problems have been discovered by the safety neighborhood whereas trying to use the patches launched for CVE-2025-55182 (CVSS rating: 10.0), a essential bug in RSC that has since been weaponized within the wild.
The three vulnerabilities are listed under –

CVE-2025-55184 (CVSS rating: 7.5) – A pre-authentication denial of service vulnerability arising from unsafe deserialization of payloads from HTTP requests to Server Perform endpoints, triggering an infinite loop that hangs the server course of and will forestall future HTTP requests from being served
CVE-2025-67779 (CVSS rating: 7.5) – An incomplete repair for CVE-2025-55184 that has the identical affect
CVE-2025-55183 (CVSS rating: 5.3) – An data leak vulnerability that will trigger a particularly crafted HTTP request despatched to a weak Server Perform to return the supply code of any Server Perform

Nonetheless, profitable exploitation of CVE-2025-55183 requires the existence of a Server Perform that explicitly or implicitly exposes an argument that has been transformed right into a string format.

The issues affecting the next variations of react-server-dom-parcel, react-server-dom-turbopack, and react-server-dom-webpack –

CVE-2025-55184 and CVE-2025-55183 – 19.0.0, 19.0.1 19.1.0, 19.1.1, 19.1.2, 19.2.0 and 19.2.1
CVE-2025-67779 – 19.0.2, 19.1.3 and 19.2.2

Safety researcher RyotaK and Shinsaku Nomura have been credited with reporting the 2 DoS bugs to the Meta Bug Bounty program, whereas Andrew MacPherson has been acknowledged for reporting the knowledge leak flaw.
Customers are suggested to replace to variations 19.0.3, 19.1.4, and 19.2.3 as quickly as potential, significantly in mild of lively exploration of CVE-2025-55182.
“When a essential vulnerability is disclosed, researchers scrutinize adjoining code paths searching for variant exploit strategies to check whether or not the preliminary mitigation could be bypassed,” the React workforce mentioned. “This sample exhibits up throughout the business, not simply in JavaScript. Further disclosures could be irritating, however they’re usually an indication of a wholesome response cycle.”

The Hacker News Tags:Code, DoS, Enable, Exposure, React, RSC, Source, Vulnerabilities

Post navigation

Previous Post: React2Shell Exploitation Escalates into Large-Scale Global Attacks, Forcing Emergency Mitigation
Next Post: Apache Struts 2 DoS Vulnerability Let Attackers Crash Server

Related Posts

OpenAI to Show Ads in ChatGPT for Logged-In U.S. Adults on Free and Go Plans OpenAI to Show Ads in ChatGPT for Logged-In U.S. Adults on Free and Go Plans The Hacker News
Fake Kling AI Facebook Ads Deliver RAT Malware to Over 22 Million Potential Victims Fake Kling AI Facebook Ads Deliver RAT Malware to Over 22 Million Potential Victims The Hacker News
Transparent Tribe Launches New RAT Attacks Against Indian Government and Academia Transparent Tribe Launches New RAT Attacks Against Indian Government and Academia The Hacker News
GreedyBear Steals M in Crypto Using 150+ Malicious Firefox Wallet Extensions GreedyBear Steals $1M in Crypto Using 150+ Malicious Firefox Wallet Extensions The Hacker News
Malicious Browser Extensions Infect 722 Users Across Latin America Since Early 2025 Malicious Browser Extensions Infect 722 Users Across Latin America Since Early 2025 The Hacker News
CRESCENTHARVEST Campaign Targets Iranian Protest Allies CRESCENTHARVEST Campaign Targets Iranian Protest Allies The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide
  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide
  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark