You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: src/content/blog/2025/12/03/critical-security-vulnerability-in-react-server-components.md
+80-2Lines changed: 80 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -50,13 +50,91 @@ We will update this post with upgrade instructions on how to upgrade as they bec
50
50
51
51
An unauthenticated attacker could craft a malicious HTTP request to any Server Function endpoint that, when deserialized by React, achieves remote code execution on the server. Further details of the vulnerability will be provided after the rollout of the fix is complete.
52
52
53
-
### Timeline {/*timeline*/}
53
+
## Update Instructions {/*update-instructions*/}
54
+
55
+
### Next.js {/*update-next-js*/}
56
+
57
+
All users should upgrade to the latest patched version in their release line:
***November 29th**: Lachlan Davidson reported the security vulnerability via [Meta Bug Bounty](https://bugbounty.meta.com/).
56
134
***November 30th**: Meta security researchers confirmed and began working with the React team on a fix.
57
135
***December 1st**: A fix was created and the React team began working with affected hosting providers and open source projects to validate the fix, implement mitigations and roll out the fix
58
136
***December 3rd**: The fix was published to npm and the publicly disclosed as CVE-2025-55182.
59
137
60
-
###Attribution {/*attribution*/}
138
+
## Attribution {/*attribution*/}
61
139
62
140
Thank you to [Lachlan Davidson](https://github.com/lachlan2k) for discovering, reporting, and working to help fix this vulnerability.
0 commit comments