Published: 03 December 2025
Updated: 03 December 2025
Reported by: Lachlan Davidson
Severity: CVSS 10.0 (Critical)
A critical security vulnerability has been disclosed in React Server Components, affecting a wide range of applications built with React and Next.js. This issue allows the possibility of unauthenticated remote code execution, making it one of the most severe vulnerabilities ever published within the React ecosystem.
This blog provides a clear overview of what happened, who is affected, and the actions development teams should take immediately.
On 29 November 2025, security researcher Lachlan Davidson reported a flaw in how React deserialises payloads handled by React Server Function endpoints. This flaw allows an attacker to craft a malicious HTTP request that, when processed by a vulnerable server, can lead to remote code execution.
The vulnerability affects applications even if they do not explicitly use React Server Functions. If an application supports React Server Components (RSC) it may still be vulnerable.
On 03 December 2025, the issue was publicly disclosed as CVE-2025-55182 after fixes were released across the ecosystem.
The vulnerability is present in the following versions of the React Server Components packages:
These packages include:
A fix has been shipped in:
Developers should upgrade immediately to one of the patched versions.
Next.js is one of the largest adopters of React Server Components. As a result, most modern Next.js applications fall within the affected category.
The React Team and Vercel have released patches for all supported release lines.
If you are running Next.js 14.3.0-canary.77 or later canary versions, downgrade to the latest stable 14.x release.
Several tools that support React Server Components may also be affected. These include:
Each project has posted its own upgrade instructions, but the general rule is to update React, React DOM, and the relevant RSC package to the latest available version.
You are not affected if:
Classic client only React apps do not need to take action.
While some hosting providers were able to apply temporary mitigations, the React Team stresses that these should not be relied upon. Developers must apply the official updates to remove the vulnerability completely.
If you maintain any React or Next.js application, you should:
If you use a third party agency or development team, confirm with them that your application has been reviewed and patched.
CVE record:
https://www.cve.org/CVERecord?id=CVE-2025-55182
Next.js advisory:
https://github.com/vercel/next.js/security/advisories/GHSA-9qr9-h5gf-34mp
React Team announcement:
https://react.dev/blog/2025/12/03/critical-security-vulnerability-in-react-server-components
Security vulnerabilities of this severity are rare, especially with a CVSS score of 10.0. The transparency and coordinated response from the React ecosystem have helped ensure that fixes were ready as soon as the issue became public.
If you are unsure whether your systems are affected or would like support reviewing your setup, feel free to reach out for guidance. https://mertosolutions.com/contact-us