On December 3, 2025 the React team disclosed a critical vulnerability (tracked as CVE-2025-55182) in React Server Components' handling of incoming payloads for Server Function / Flight requests. The flaw involves unsafe deserialization of untrusted data, which under certain conditions lets an attacker achieve unauthenticated remote code execution (RCE). The React team, framework maintainers (Next.js), cloud/CDN/WAF providers, and other ecosystem partners responded with patches and mitigations.
The vulnerability is present in the following React Server Components packages:
react-server-dom-parcel — 19.0.0, 19.1.0, 19.1.1, 19.2.0.react-server-dom-webpack — 19.0.0, 19.1.0, 19.1.1, 19.2.0.react-server-dom-turbopack — 19.0.0, 19.1.0, 19.1.1, 19.2.0.These packages are used directly by some projects and are also embedded inside frameworks and bundlers that support React Server Components. The React advisory and the NVD list these exact package versions.
Frameworks and tools that embed or depend on these RSC implementations may inherit the vulnerability. Notable examples called out in official advisories include:
Important: even if your app does not define Server Function endpoints, an app that supports React Server Components may still be exposed, depending on how the framework/bundler handles Flight/Server Function requests. Check your framework’s advisory.
As of the time of these advisories (December 3, 2025), vendors and major security trackers reported the vulnerability and published patches; there were no widely confirmed public reports of in-the-wild exploitation at publication time, though some unverified reports circulated. Treat the vulnerability as urgent and remediate quickly.
React Server Component packages (fixed):
react-server-dom-parcel: 19.0.1, 19.1.2, 19.2.1react-server-dom-webpack: 19.0.1, 19.1.2, 19.2.1react-server-dom-turbopack: 19.0.1, 19.1.2, 19.2.1
(These package versions include hardened input handling.)Next.js (examples of fixed versions published by Next.js):
next patched releases include 15.0.5, 15.1.9, 15.2.6, 15.3.6, 15.4.8, 15.5.7, 16.0.7 (upgrade to a patched release in your version series). See the Next.js advisory for exact affected ranges and fixed releases.Provider mitigations: Vercel and several large CDN/WAF vendors rolled out mitigations / WAF rules while patches were published; however, provider mitigations are a stopgap — you should update your dependencies.
package.json and lockfile for any of the react-server-dom-* packages or for Next.js versions in the affected ranges.
npm ls react-server-dom-webpack or yarn why react-server-dom-webpackA. Immediate — apply provider mitigations if available
B. Upgrade affected packages and frameworks (primary remediation)
react-server-dom-* package, update to the patched package versions:# example: upgrade react - server - dom - webpack to patched version
npm install react - server - dom - webpack@19.2.1
# or with yarn
yarn add react - server - dom - webpack@19.2.1
Replace package and version with the matching patched release for your series (19.0.1 / 19.1.2 / 19.2.1 as appropriate).
# example: upgrade to a patched Next.js release(pick the appropriate patched version for your branch)
npm install next @16.0.7
Check the Next.js GHSA to determine the correct patched version for your installed release. Do not blindly jump major versions without testing.
C. Rebuild & test
D. If an immediate upgrade is risky
If you don’t have the time or in-house resources to safely apply these upgrades and fully test them, Themefisher offers a Version Upgrade & Security Hardening Service that includes:
If you’d like, we can perform an audit and send a prioritized remediation plan. Contact us.
CVE-2025-55182 is a real and serious vulnerability that affects modern React Server Component stacks. Official patches and provider mitigations exist — apply them now. If you need help auditing or upgrading your theme/site/app, Themefisher can handle the upgrade and validation so you can focus on running your business.