Bits Kingdom logo with a hexagon lattice, uppercase text in white, and a minimalistic design.

Critical React RSC Vulnerability: What Developers Need to Know

A severe flaw with urgency

Home / Development / Critical React RSC Vulnerability: What Developers Need to Know

A rare and high-impact security event

The React Team does not often publish security warnings of this magnitude. In fact, critical vulnerability announcements in the React ecosystem are rare, which makes this disclosure especially important for developers, teams, and anyone working with React Server Components. When a CVSS 10.0 vulnerability appears in such a widely used framework—and when the announcement comes directly from the React Team—it signals an exceptional situation requiring immediate attention. This is not routine maintenance or a minor patch; it is a high-severity issue that can compromise production systems if left unpatched.

On December 3, 2025, the React Team publicly disclosed an unauthenticated remote code execution vulnerability (CVE-2025-55182) affecting React Server Components (RSC). The flaw allows attackers to send malicious HTTP payloads to Server Function endpoints, which React would then improperly deserialize, enabling remote execution of code on the server.

Who is affected by this vulnerability?

This vulnerability impacts any application using React Server Components, even if the app does not explicitly use Server Functions. Several ecosystem tools include or depend on the vulnerable packages, affecting a wide range of frameworks and bundlers.

Affected packagesVersions
react-server-dom-webpack19.0, 19.1.0, 19.1.1, 19.2.0
react-server-dom-parcel19.0, 19.1.0, 19.1.1, 19.2.0
react-server-dom-turbopack19.0, 19.1.0, 19.1.1, 19.2.0
Affected frameworks & bundlersStatus
Next.jsRequires immediate upgrade
React Router (RSC APIs)Requires dependency upgrades
WakuRequires latest release
@parcel/rscRequires updated versions
@vitejs/plugin-rscRequires latest plugin
rwsdkAffected; update required

Patched versions now available

The React Team released fixed versions within just a few days of the initial report. Upgrading is the only reliable mitigation, even if your hosting provider has applied temporary protections. You should update immediately to one of the patched versions.

Fixed versionsStatus
19.0.1Safe
19.1.2Safe
19.2.1Safe

Why this vulnerability matters

React Server Components introduced new possibilities for server-driven UI, but they also expanded the attack surface. The vulnerability exploited a flaw in the decoding layer React uses to translate HTTP requests into server function calls. Because this process happens before authentication checks, attackers could deliver arbitrary payloads to vulnerable endpoints.

Although the React Team has not yet published deep technical details, they will do so once the fix is fully deployed and the ecosystem is updated. For now, the priority is ensuring every affected project upgrades immediately.

What developers should do right now

You should verify your React, React DOM, and RSC-related dependencies to ensure none of the vulnerable versions are present. You should also update any RSC-compatible frameworks you use. Below is a quick overview of recommended upgrade paths for each major tool.

Framework / toolUpgrade action
Next.jsInstall latest patched version in your release line
React Router (unstable RSC APIs)Update React, React DOM, and RSC packages
ExpoUpdate React and react-server-dom-webpack
Redwood SDKEnsure rwsdk ≥ 1.0.0-alpha.0 and update RSC packages
WakuUpdate React, React DOM, RSC packages, and Waku itself
@vitejs/plugin-rscInstall latest plugin release
react-server-dom-parcel / turbopack / webpackUpdate all RSC packages to latest versions

How the vulnerability was handled

The response timeline shows rapid collaboration between Meta’s security team, the React Team, hosting providers, and open-source maintainers.

DateEvent
Nov 29Vulnerability reported through Meta Bug Bounty
Nov 30Meta security confirms issue and coordinates fix
Dec 1Fix created; ecosystem partners begin mitigation
Dec 3Patched versions released; CVE publicly disclosed

This coordinated rollout helped reduce exposure and ensured that frameworks depending on RSC could deliver patched versions quickly.

Conclusion: update immediately to stay secure

This vulnerability is both rare and severe, and it highlights the importance of keeping React ecosystems up to date—especially when working with server-side features like React Server Components. If your app, framework, or bundler includes any affected package, you should upgrade immediately to a patched version. With fixes now available across all major RSC-enabled tools, the safest path is simply to update as soon as possible.

About the author

<a href="https://bitskingdom.com/blog/author/brandon/" target="_self">Brandon Quintero</a>
Brandon Quintero
I am a Software Developer and Cybersecurity Engineer. This dual background gives me a unique perspective—I don’t just build scalable, high-performing applications; I design them with security at the core, right from the start. While my foundation lies in cybersecurity, my current focus is on software development, where I bring both fields together to deliver robust, secure solutions.

Explore more topics:

ChatGPT Hallucinations: The Seahorse Emoji That Never Existed

When machines hallucinate their own logic