Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-fv66-9v8q-g76r | React Server Components are Vulnerable to RCE |
Fri, 05 Dec 2025 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Facebook react
Vercel Vercel next.js |
|
| CPEs | cpe:2.3:a:facebook:react:19.0.0:*:*:*:*:*:*:* cpe:2.3:a:facebook:react:19.1.0:*:*:*:*:*:*:* cpe:2.3:a:facebook:react:19.1.1:*:*:*:*:*:*:* cpe:2.3:a:facebook:react:19.2.0:*:*:*:*:*:*:* cpe:2.3:a:vercel:next.js:*:*:*:*:*:node.js:*:* cpe:2.3:a:vercel:next.js:14.3.0:canary77:*:*:*:node.js:*:* cpe:2.3:a:vercel:next.js:14.3.0:canary78:*:*:*:node.js:*:* cpe:2.3:a:vercel:next.js:14.3.0:canary79:*:*:*:node.js:*:* cpe:2.3:a:vercel:next.js:14.3.0:canary80:*:*:*:node.js:*:* cpe:2.3:a:vercel:next.js:14.3.0:canary81:*:*:*:node.js:*:* cpe:2.3:a:vercel:next.js:14.3.0:canary82:*:*:*:node.js:*:* cpe:2.3:a:vercel:next.js:14.3.0:canary83:*:*:*:node.js:*:* cpe:2.3:a:vercel:next.js:14.3.0:canary84:*:*:*:node.js:*:* cpe:2.3:a:vercel:next.js:14.3.0:canary85:*:*:*:node.js:*:* cpe:2.3:a:vercel:next.js:14.3.0:canary86:*:*:*:node.js:*:* cpe:2.3:a:vercel:next.js:14.3.0:canary87:*:*:*:node.js:*:* cpe:2.3:a:vercel:next.js:15.6.0:-:*:*:*:node.js:*:* cpe:2.3:a:vercel:next.js:15.6.0:canary0:*:*:*:node.js:*:* cpe:2.3:a:vercel:next.js:15.6.0:canary10:*:*:*:node.js:*:* cpe:2.3:a:vercel:next.js:15.6.0:canary11:*:*:*:node.js:*:* cpe:2.3:a:vercel:next.js:15.6.0:canary12:*:*:*:node.js:*:* cpe:2.3:a:vercel:next.js:15.6.0:canary13:*:*:*:node.js:*:* cpe:2.3:a:vercel:next.js:15.6.0:canary14:*:*:*:node.js:*:* cpe:2.3:a:vercel:next.js:15.6.0:canary15:*:*:*:node.js:*:* cpe:2.3:a:vercel:next.js:15.6.0:canary16:*:*:*:node.js:*:* cpe:2.3:a:vercel:next.js:15.6.0:canary17:*:*:*:node.js:*:* cpe:2.3:a:vercel:next.js:15.6.0:canary18:*:*:*:node.js:*:* cpe:2.3:a:vercel:next.js:15.6.0:canary19:*:*:*:node.js:*:* cpe:2.3:a:vercel:next.js:15.6.0:canary1:*:*:*:node.js:*:* cpe:2.3:a:vercel:next.js:15.6.0:canary20:*:*:*:node.js:*:* cpe:2.3:a:vercel:next.js:15.6.0:canary21:*:*:*:node.js:*:* cpe:2.3:a:vercel:next.js:15.6.0:canary22:*:*:*:node.js:*:* cpe:2.3:a:vercel:next.js:15.6.0:canary23:*:*:*:node.js:*:* cpe:2.3:a:vercel:next.js:15.6.0:canary24:*:*:*:node.js:*:* cpe:2.3:a:vercel:next.js:15.6.0:canary25:*:*:*:node.js:*:* cpe:2.3:a:vercel:next.js:15.6.0:canary26:*:*:*:node.js:*:* cpe:2.3:a:vercel:next.js:15.6.0:canary27:*:*:*:node.js:*:* cpe:2.3:a:vercel:next.js:15.6.0:canary28:*:*:*:node.js:*:* cpe:2.3:a:vercel:next.js:15.6.0:canary29:*:*:*:node.js:*:* cpe:2.3:a:vercel:next.js:15.6.0:canary2:*:*:*:node.js:*:* cpe:2.3:a:vercel:next.js:15.6.0:canary30:*:*:*:node.js:*:* cpe:2.3:a:vercel:next.js:15.6.0:canary31:*:*:*:node.js:*:* cpe:2.3:a:vercel:next.js:15.6.0:canary32:*:*:*:node.js:*:* cpe:2.3:a:vercel:next.js:15.6.0:canary33:*:*:*:node.js:*:* cpe:2.3:a:vercel:next.js:15.6.0:canary34:*:*:*:node.js:*:* cpe:2.3:a:vercel:next.js:15.6.0:canary35:*:*:*:node.js:*:* cpe:2.3:a:vercel:next.js:15.6.0:canary36:*:*:*:node.js:*:* cpe:2.3:a:vercel:next.js:15.6.0:canary37:*:*:*:node.js:*:* cpe:2.3:a:vercel:next.js:15.6.0:canary38:*:*:*:node.js:*:* cpe:2.3:a:vercel:next.js:15.6.0:canary39:*:*:*:node.js:*:* cpe:2.3:a:vercel:next.js:15.6.0:canary3:*:*:*:node.js:*:* cpe:2.3:a:vercel:next.js:15.6.0:canary40:*:*:*:node.js:*:* cpe:2.3:a:vercel:next.js:15.6.0:canary41:*:*:*:node.js:*:* cpe:2.3:a:vercel:next.js:15.6.0:canary42:*:*:*:node.js:*:* cpe:2.3:a:vercel:next.js:15.6.0:canary43:*:*:*:node.js:*:* cpe:2.3:a:vercel:next.js:15.6.0:canary44:*:*:*:node.js:*:* cpe:2.3:a:vercel:next.js:15.6.0:canary45:*:*:*:node.js:*:* cpe:2.3:a:vercel:next.js:15.6.0:canary46:*:*:*:node.js:*:* cpe:2.3:a:vercel:next.js:15.6.0:canary47:*:*:*:node.js:*:* cpe:2.3:a:vercel:next.js:15.6.0:canary48:*:*:*:node.js:*:* cpe:2.3:a:vercel:next.js:15.6.0:canary49:*:*:*:node.js:*:* cpe:2.3:a:vercel:next.js:15.6.0:canary4:*:*:*:node.js:*:* cpe:2.3:a:vercel:next.js:15.6.0:canary50:*:*:*:node.js:*:* cpe:2.3:a:vercel:next.js:15.6.0:canary51:*:*:*:node.js:*:* cpe:2.3:a:vercel:next.js:15.6.0:canary52:*:*:*:node.js:*:* cpe:2.3:a:vercel:next.js:15.6.0:canary53:*:*:*:node.js:*:* cpe:2.3:a:vercel:next.js:15.6.0:canary54:*:*:*:node.js:*:* cpe:2.3:a:vercel:next.js:15.6.0:canary55:*:*:*:node.js:*:* cpe:2.3:a:vercel:next.js:15.6.0:canary56:*:*:*:node.js:*:* cpe:2.3:a:vercel:next.js:15.6.0:canary57:*:*:*:node.js:*:* cpe:2.3:a:vercel:next.js:15.6.0:canary5:*:*:*:node.js:*:* cpe:2.3:a:vercel:next.js:15.6.0:canary6:*:*:*:node.js:*:* cpe:2.3:a:vercel:next.js:15.6.0:canary7:*:*:*:node.js:*:* cpe:2.3:a:vercel:next.js:15.6.0:canary8:*:*:*:node.js:*:* cpe:2.3:a:vercel:next.js:15.6.0:canary9:*:*:*:node.js:*:* cpe:2.3:a:vercel:next.js:16.0.0:-:*:*:*:node.js:*:* |
|
| Vendors & Products |
Facebook react
Vercel Vercel next.js |
Fri, 05 Dec 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
ssvc
|
ssvc
|
Fri, 05 Dec 2025 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
kev
|
Fri, 05 Dec 2025 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | next: From CVEorg collector | |
| Weaknesses | CWE-502 | |
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Thu, 04 Dec 2025 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Thu, 04 Dec 2025 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Facebook
Facebook react-server-dom-parcel Facebook react-server-dom-turbopack Facebook react-server-dom-webpack |
|
| Vendors & Products |
Facebook
Facebook react-server-dom-parcel Facebook react-server-dom-turbopack Facebook react-server-dom-webpack |
Thu, 04 Dec 2025 01:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Wed, 03 Dec 2025 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Wed, 03 Dec 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 03 Dec 2025 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A pre-authentication remote code execution vulnerability exists in React Server Components versions 19.0.0, 19.1.0, 19.1.1, and 19.2.0 including the following packages: react-server-dom-parcel, react-server-dom-turbopack, and react-server-dom-webpack. The vulnerable code unsafely deserializes payloads from HTTP requests to Server Function endpoints. | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Meta
Published:
Updated: 2026-02-26T16:57:36.794Z
Reserved: 2025-08-08T18:21:47.119Z
Link: CVE-2025-55182
Updated: 2025-12-04T17:32:12.884Z
Status : Analyzed
Published: 2025-12-03T16:15:56.463
Modified: 2025-12-06T02:00:02.510
Link: CVE-2025-55182
OpenCVE Enrichment
Updated: 2025-12-04T16:44:12Z
Github GHSA