React Security Advisory — December 2025
New Vulnerabilities Disclosed & Immediate Upgrade Required
Summary of Newly Disclosed Vulnerabilities
High Severity — Denial of Service
CVE-2025-55184 and CVE-2025-67779
CVSS: 7.5 (High)
Medium Severity — Source Code Exposure
CVE-2025-55183
CVSS: 5.3 (Medium)
Upgrading immediately is strongly recommended due to the severity of these newly identified vulnerabilities.
Important Notes
- The patches published earlier are vulnerable.
- If you previously updated for last week's Critical Security Vulnerability, you must update again.
- Versions 19.0.2, 19.1.3, and 19.2.2 contain incomplete fixes and require updating.
Upgrade steps remain the same as outlined in the previous advisory.
Further technical details will be released once the fix rollout is complete.
Immediate Action Required
These vulnerabilities affect the same packages and versions as CVE-2025-55182.
The impacted versions include:
- 19.0.0
- 19.0.1
- 19.0.2
- 19.1.0
- 19.1.1
- 19.1.2
- 19.2.0
- 19.2.1
- 19.2.2
Affected Packages
react-server-dom-webpackreact-server-dom-parcelreact-server-dom-turbopack
Safe Versions (Fixed)
- 19.0.3
- 19.1.4
- 19.2.3
Upgrade to any of these fixed versions immediately.
Apps Not Affected
You are not affected if:
- Your React app does not use a server.
- Your app does not use a framework/bundler that supports React Server Components.
Why Multiple Follow-Up CVEs?
Critical CVEs often lead researchers to re-inspect related code paths, discovering bypass variants.
This is a common pattern across all ecosystems.
Example: After Log4Shell, additional CVEs were reported as the community validated the original fix.
Additional disclosures indicate a healthy security response cycle, not instability.
Affected Frameworks & Bundlers
Some frameworks/bundlers depend on or embed the vulnerable packages. These include:
- next
- react-router
- waku
- @parcel/rsc
- @vite/rsc-plugin
- rwsdk
Upgrade steps remain the same as described previously.
Hosting Provider Mitigations
Temporary mitigations have been deployed with major hosting providers.
Do not rely on these as a long-term fix. You must update.
React Native Impact
If you use React Native:
-
Not in a monorepo: You're safe; nothing to do.
-
In a monorepo: Update only the impacted packages:
react-server-dom-webpackreact-server-dom-parcelreact-server-dom-turbopack
You do not need to update react or react-dom.
This avoids version mismatch errors in React Native.
More info is available via the linked issue.
Vulnerability Details
High Severity: Denial of Service
CVE-2025-55184 and CVE-2025-67779
CVSS 7.5
A malicious HTTP request sent to any Server Functions endpoint can cause an infinite loop during deserialization, hanging the server process and consuming CPU.
Apps supporting React Server Components may be vulnerable even if they do not explicitly define Server Functions.
The published patches prevent the infinite loop behavior.
Additional Fix Notice
The initial fix for CVE-2025-55184 was incomplete.
Vulnerable versions:
- 19.0.2
- 19.1.3
- 19.2.2
Safe versions:
- 19.0.3
- 19.1.4
- 19.2.3
This incomplete fix resulted in a new CVE (CVE-2025-67779) which has now been addressed.
Medium Severity: Source Code Exposure
CVE-2025-55183
CVSS 5.3
A crafted HTTP request to a vulnerable Server Function may leak the source code of the function, particularly if:
- It returns stringified arguments.
- It implicitly or explicitly stringifies sensitive values.
Example vulnerable code:
'use server';
export async function serverFunction(name) {
const conn = db.createConnection('SECRET KEY');
const user = await conn.createUser(name);
return {
id: user.id,
message: `Hello, ${name}!`
};
}
