🔐 CVE Alert

CVE-2025-55182

CRITICAL 10.0 ⚠️ CISA KEV
CVSS Score
10.0
EPSS Score
0.0%
EPSS Percentile
0th

A pre-authentication remote code execution vulnerability exists in React Server Components versions 19.0.0, 19.1.0, 19.1.1, and 19.2.0 including the following packages: react-server-dom-parcel, react-server-dom-turbopack, and react-server-dom-webpack. The vulnerable code unsafely deserializes payloads from HTTP requests to Server Function endpoints.

Vendor meta
Product react-server-dom-webpack
Published Dec 3, 2025
Last Updated Feb 26, 2026
⚠️ Actively Exploited — Act Now

Get instant alerts for meta react-server-dom-webpack

This vulnerability is actively exploited in the wild. Set up free real-time alerts so you're first to know about threats like CVE-2025-55182.

Get Free Alerts → Free · No credit card · 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability

Affected Versions

Meta / react-server-dom-webpack
19.0.0 ≤ 19.0.0 19.1.0 ≤ 19.1.1 19.2.0 ≤ 19.2.0
Meta / react-server-dom-turbopack
19.0.0 ≤ 19.0.0 19.1.0 ≤ 19.1.1 19.2.0 ≤ 19.2.0
Meta / react-server-dom-parcel
19.0.0 ≤ 19.0.0 19.1.0 ≤ 19.1.1 19.2.0 ≤ 19.2.0

References

NVD ↗ CVE.org ↗ EPSS Data ↗
facebook.com: https://www.facebook.com/security/advisories/cve-2025-55182 react.dev: https://react.dev/blog/2025/12/03/critical-security-vulnerability-in-react-server-components aws.amazon.com: https://aws.amazon.com/blogs/security/china-nexus-cyber-threat-groups-rapidly-exploit-react2shell-vulnerability-cve-2025-55182/ cisa.gov: https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-55182 openwall.com: http://www.openwall.com/lists/oss-security/2025/12/03/4 news.ycombinator.com: https://news.ycombinator.com/item?id=46136026