Insecure deserialization In react-server-dom-webpack
Ecosystem | Package | Affected version | Patched versions |
|---|---|---|---|
npm default | react-server-dom-webpack | 19.0.1, 19.1.2, 19.2.1 | |
npm default | react-server-dom-turbopack | 19.0.1, 19.1.2, 19.2.1 | |
npm default | react-server-dom-parcel | 19.0.1, 19.1.2, 19.2.1 |
Description
React Server Components are Vulnerable to RCE
Impact
There is an unauthenticated remote code execution vulnerability in React Server Components.
We recommend upgrading immediately.
The vulnerability is present in versions 19.0, 19.1.0, 19.1.1, and 19.2.0 of:
Patches
A fix was introduced in versions 19.0.1, 19.1.2, and 19.2.1. If you are using any of the above packages please upgrade to any of the fixed versions immediately.
If your app’s React code does not use a server, your app is not affected by this vulnerability. If your app does not use a framework, bundler, or bundler plugin that supports React Server Components, your app is not affected by this vulnerability.
References
See the blog post for more information and upgrade instructions.
Mitigation
• npm react-server-dom-webpack: Upgrade to version(s) 19.0.1, 19.1.2, 19.2.1 or higher.
• npm react-server-dom-turbopack: Upgrade to version(s) 19.0.1, 19.1.2, 19.2.1 or higher.
• npm react-server-dom-parcel: Upgrade to version(s) 19.0.1, 19.1.2, 19.2.1 or higher.
References
• GitHub Advisory DatabaseSeverity v4.0
8.4
High
Fluid Attacks ID
FLAT-P74O0
CVE ID
CVE-2025-55182CWE ID(s)
CWE-502Alternative ID
GHSA-fv66-9v8q-g76r
EPSS
N/A
Percentile
N/A
Source
GitHub Advisory Database
Does your application use this vulnerable software?
During the free trial, our tools assess your application, identify vulnerabilities, and provide recommendations for their remediation.