Blogs

How Serious Are the New React & Next.js RCE Vulnerabilities?

7.2 min readViews: 117

The JavaScript ecosystem woke up to a major security alarm this week. Two newly disclosed vulnerabilities — CVE-2025-55182 (React) and CVE-2025-66478 (Next.js) — expose millions of applications to unauthenticated remote code execution (RCE). What makes this discovery particularly alarming is that even default installations of React Server Components (RSC) and Next.js are exposed, meaning developers who never touched advanced configurations are still at risk.

As a team that works extensively with full-stack engineering, performance optimization, and secure cloud deployments, we consider this one of the most consequential vulnerabilities to hit the React ecosystem in recent years. These flaws strike at the heart of the React Server Components “Flight” protocol, enabling attackers to execute arbitrary code using nothing more than a crafted HTTP request.

How Serious Are the New React & Next.js RCE Vulnerabilities

In this blog, we break down what happened, why it matters, which versions are vulnerable, and what engineering teams must do immediately. Our goal is to provide a clear, deeply informative, and actionable explanation — without unnecessary noise — so teams can assess their exposure and respond appropriately.

This article uses SEO-aligned primary keywords such as React vulnerability, Next.js security patch, RSC Flight protocol exploit, and secondary keywords like remote code execution, JavaScript deserialization flaw, cloud application security, as well as natural LSI keywords including secure coding practices, server-side rendering risks, and framework-level threats for enhanced discoverability.

Understanding the Crisis: What Do CVE-2025-55182 & CVE-2025-66478 Actually Mean?

Both vulnerabilities originate from the same architectural issue within the React Server Components ecosystem, but impact different layers:

  • CVE-2025-55182 → Impacts the react-server package itself

  • CVE-2025-66478 → Impacts the Next.js framework implementation that relies on this protocol

At the core of these vulnerabilities lies a logical deserialization flaw. The React Flight protocol accepts structured payloads sent from clients to the server. However, due to inadequate validation and unsafe processing, the server assumes these payloads are trustworthy — a dangerous assumption in any network-exposed environment.

When an attacker sends a maliciously crafted request, the server may deserialize and interpret the payload in a way that allows high-privilege JavaScript execution. In security terms, this elevates a harmless-looking request into a complete system compromise.

This attack is:

  • Unauthenticated — no cookies, tokens, or session needed

  • Remote — can be executed over the internet

  • Reliable — the vulnerability consistently produces successful exploitation

  • Default-enabled — no developer misconfiguration required

This combination places it among the most severe JavaScript ecosystem vulnerabilities in recent memory.

Unlock AI Potential with Our
Generative AI Development Company

call to action

Why This Vulnerability Is So Dangerous for Production Systems

Most security flaws require some special condition — misconfiguration, weak permissions, exposed environment variables, or an outdated dependency chain.

But this time, the threat is built into what many developers consider the new standard of modern React development.

1. The vulnerability impacts the default RSC setup

If you used create-next-app, followed the documentation, and deployed a production build, your application is likely exposed — unless upgraded to the hardened versions.

2. Attackers don’t need credentials or sessions

This is a true network-level attack surface, not a user-privilege issue.

3. Malicious payloads exploit backend logic, not frontend code

Although RSC feels like a frontend feature, the vulnerability compromises the server itself, giving attackers access to internal execution logic.

4. RCE is the most serious category of software vulnerability

A remote code execution flaw can lead to:

  • full server takeover

  • data exfiltration

  • supply-chain infection

  • defacement or sabotage

  • lateral movement across cloud resources

From our experience handling enterprise deployments, these risks are massive — especially for companies deploying multiple micro-frontends or high-traffic Next.js applications.

Real-World Impact: How Widespread Is the Threat?

According to research shared publicly, 39% of cloud environments contain versions of React or Next.js susceptible to these vulnerabilities.

More insights:

  • 69% of all cloud environments contain at least one Next.js framework deployment

  • 44% of total cloud environments have publicly exposed Next.js applications

This means nearly half of public-facing cloud workloads that use modern JavaScript stacks may already be vulnerable.

Given the ubiquity of Next.js in enterprise landscapes — powering dashboards, SaaS platforms, marketing websites, e-commerce portals, and hybrid rendering systems — the exposure footprint is enormous.

Root Cause: The RSC “Flight” Protocol and Unsafe Deserialization

React Server Components introduced a highly innovative architecture — but like all new paradigms, there is risk in early implementations.

The Flight protocol handles serialization and deserialization of component data between server and client. However, improper validation on the server side allowed for:

  • malformed payloads to bypass checks

  • incorrect type handling

  • function references being reconstructed unsafely

  • privileged internal operations being exposed

When we reviewed the conceptual breakdown of this flaw, it aligned with classic deserialization vulnerabilities we’ve seen in other programming ecosystems — Java, PHP object deserialization, and Python’s pickle mechanism.

But in the JavaScript world, such a flaw at the framework level, especially in such a widely adopted protocol, amplifies the impact significantly.

Transform Your Business with Our
Generative AI Development Services

call to action

Which Versions Are Vulnerable?

React RSC packages (react-server-dom*) vulnerabilities:

Vulnerable Versions Patched Versions
19.0.0, 19.1.0, 19.1.1, 19.2.0 19.0.1, 19.1.2, 19.2.1

Next.js RSC-powered versions:

Vulnerable Versions Secured Releases
14.3.0-canary, all 15.x, all 16.x (App Router) 14.3.0-canary.88, 15.0.5, 15.1.9, 15.2.6, 15.3.6, 15.4.8, 15.5.7, 16.0.7

Other frameworks likely affected:

  • Redwood SDK

  • Waku

  • React Router RSC preview

  • Vite + RSC plugins

  • Parcel RSC plugins

Anything bundling or re-exporting the react-server code path is at risk.

Interestingly, Google Cloud confirmed that its default OS images are not impacted, which is reassuring — but does not mitigate exposure within deployed applications themselves.

What Security Teams Must Do Immediately

Based on our internal review and best practices from large-scale engineering environments, we strongly recommend the following steps:

1. Upgrade React, Next.js, and all RSC-related dependencies

This is the only guaranteed mitigation.
Ensure your package versions match the hardened releases.

2. Audit all RSC-enabled projects

Even if the application is partially using RSC or experimenting with the App Router, the attack surface may be active.

3. Validate that indirect dependencies are also patched

Some build tools and frameworks bundle React server dependencies internally.

4. Review logs for suspicious RSC payload requests

Attack patterns often involve malformed inputs or unusual serialized data.

5. Reassess your server exposure

Public-facing RSC endpoints should be carefully evaluated, especially in multi-cloud environments.

From our experience supporting enterprise-grade engineering teams, patch cycles must be immediate for RCE-level threats. Even a short delay can create exploitable windows — particularly for high-traffic applications where attackers can probe endpoints continuously.

How This Incident Reflects Broader Trends in Framework Security

The JavaScript community has rapidly adopted new server-side rendering and hybrid models, especially through frameworks like Next.js.

However, every major architectural shift introduces new risks:

1. Increased complexity leads to deeper attack surfaces

The more the server and client intertwine, the more opportunities for protocol-level vulnerabilities.

2. Framework-level security flaws propagate instantly

A single insecure function within a core library impacts millions of applications overnight.

3. Developers trust defaults — and attackers love that

Security must be proactive, not reactive.

4. Cloud-native deployment makes exposure global

A vulnerable app once impacted a single server; now it exposes entire container fleets.

This is a wake-up call for the ecosystem — and a reminder that modern frameworks require modern security hygiene.

Our Perspective as Engineering & Security Practitioners

Having worked across countless large-scale digital transformation projects, we’ve learned that:

  • Developers typically assume framework defaults are safe

  • Teams often overlook transitive dependency risks

  • RSC adoption has grown faster than security reviews

  • Cloud platforms unintentionally magnify exposure when misconfigurations combine with vulnerabilities

These vulnerabilities reinforce the need for:

  • constant dependency monitoring

  • automatic security patch pipelines

  • proactive architecture reviews

  • early detection and incident response planning

We strongly encourage engineering leaders to treat this incident seriously and prioritize patching as part of an immediate sprint.

FAQs 

1. Are all React applications vulnerable?

No. Only applications using React Server Components through react-server packages or frameworks that implement the Flight protocol are impacted. Traditional client-side React apps are not affected.

2. Is Next.js safe if I only use Pages Router, not App Router?

In most cases, the Pages Router alone does not load RSC logic. However, teams should verify dependencies, especially when combining hybrid rendering or experimental features.

3. Can this vulnerability be exploited without authentication?

Yes. This is an entirely unauthenticated remote code execution flaw — attackers can send malicious payloads directly over the network.

4. Will updating Next.js automatically fix the React vulnerability?

Not always. While patched Next.js versions include the fix, applications should also update react-server and related RSC packages manually to ensure full protection.

5. Are cloud deployments more exposed?

Yes. Cloud environments amplify visibility and accessibility. The research data showing that 44% of cloud environments run publicly exposed Next.js apps highlights the scale of risk.

Resource Center

These aren’t just blogs – they’re bite-sized strategies for navigating a fast-moving business world. So pour yourself a cup, settle in, and discover insights that could shape your next big move.

Go to Top