Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-925w-6v3x-g4j4 | Source Code Exposure Vulnerability in React Server Components |
Wed, 07 Jan 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 15 Dec 2025 12:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | next: React Server Components: Source code exposure through crafted HTTP request | |
| Weaknesses | CWE-497 | |
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Fri, 12 Dec 2025 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Facebook react
Vercel Vercel next.js |
|
| Weaknesses | NVD-CWE-noinfo | |
| CPEs | cpe:2.3:a:facebook:react:*:*:*:*:*:*:*:* cpe:2.3:a:vercel:next.js:*:*:*:*:*:node.js:*:* cpe:2.3:a:vercel:next.js:15.6.0:-:*:*:*:node.js:*:* cpe:2.3:a:vercel:next.js:15.6.0:canary0:*:*:*:node.js:*:* cpe:2.3:a:vercel:next.js:15.6.0:canary10:*:*:*:node.js:*:* cpe:2.3:a:vercel:next.js:15.6.0:canary11:*:*:*:node.js:*:* cpe:2.3:a:vercel:next.js:15.6.0:canary12:*:*:*:node.js:*:* cpe:2.3:a:vercel:next.js:15.6.0:canary13:*:*:*:node.js:*:* cpe:2.3:a:vercel:next.js:15.6.0:canary14:*:*:*:node.js:*:* cpe:2.3:a:vercel:next.js:15.6.0:canary15:*:*:*:node.js:*:* cpe:2.3:a:vercel:next.js:15.6.0:canary16:*:*:*:node.js:*:* cpe:2.3:a:vercel:next.js:15.6.0:canary17:*:*:*:node.js:*:* cpe:2.3:a:vercel:next.js:15.6.0:canary18:*:*:*:node.js:*:* cpe:2.3:a:vercel:next.js:15.6.0:canary19:*:*:*:node.js:*:* cpe:2.3:a:vercel:next.js:15.6.0:canary1:*:*:*:node.js:*:* cpe:2.3:a:vercel:next.js:15.6.0:canary20:*:*:*:node.js:*:* cpe:2.3:a:vercel:next.js:15.6.0:canary21:*:*:*:node.js:*:* cpe:2.3:a:vercel:next.js:15.6.0:canary22:*:*:*:node.js:*:* cpe:2.3:a:vercel:next.js:15.6.0:canary23:*:*:*:node.js:*:* cpe:2.3:a:vercel:next.js:15.6.0:canary24:*:*:*:node.js:*:* cpe:2.3:a:vercel:next.js:15.6.0:canary25:*:*:*:node.js:*:* cpe:2.3:a:vercel:next.js:15.6.0:canary26:*:*:*:node.js:*:* cpe:2.3:a:vercel:next.js:15.6.0:canary27:*:*:*:node.js:*:* cpe:2.3:a:vercel:next.js:15.6.0:canary28:*:*:*:node.js:*:* cpe:2.3:a:vercel:next.js:15.6.0:canary29:*:*:*:node.js:*:* cpe:2.3:a:vercel:next.js:15.6.0:canary2:*:*:*:node.js:*:* cpe:2.3:a:vercel:next.js:15.6.0:canary30:*:*:*:node.js:*:* cpe:2.3:a:vercel:next.js:15.6.0:canary31:*:*:*:node.js:*:* cpe:2.3:a:vercel:next.js:15.6.0:canary32:*:*:*:node.js:*:* cpe:2.3:a:vercel:next.js:15.6.0:canary33:*:*:*:node.js:*:* cpe:2.3:a:vercel:next.js:15.6.0:canary34:*:*:*:node.js:*:* cpe:2.3:a:vercel:next.js:15.6.0:canary35:*:*:*:node.js:*:* cpe:2.3:a:vercel:next.js:15.6.0:canary36:*:*:*:node.js:*:* cpe:2.3:a:vercel:next.js:15.6.0:canary37:*:*:*:node.js:*:* cpe:2.3:a:vercel:next.js:15.6.0:canary38:*:*:*:node.js:*:* cpe:2.3:a:vercel:next.js:15.6.0:canary39:*:*:*:node.js:*:* cpe:2.3:a:vercel:next.js:15.6.0:canary3:*:*:*:node.js:*:* cpe:2.3:a:vercel:next.js:15.6.0:canary40:*:*:*:node.js:*:* cpe:2.3:a:vercel:next.js:15.6.0:canary41:*:*:*:node.js:*:* cpe:2.3:a:vercel:next.js:15.6.0:canary42:*:*:*:node.js:*:* cpe:2.3:a:vercel:next.js:15.6.0:canary43:*:*:*:node.js:*:* cpe:2.3:a:vercel:next.js:15.6.0:canary44:*:*:*:node.js:*:* cpe:2.3:a:vercel:next.js:15.6.0:canary45:*:*:*:node.js:*:* cpe:2.3:a:vercel:next.js:15.6.0:canary46:*:*:*:node.js:*:* cpe:2.3:a:vercel:next.js:15.6.0:canary47:*:*:*:node.js:*:* cpe:2.3:a:vercel:next.js:15.6.0:canary48:*:*:*:node.js:*:* cpe:2.3:a:vercel:next.js:15.6.0:canary49:*:*:*:node.js:*:* cpe:2.3:a:vercel:next.js:15.6.0:canary4:*:*:*:node.js:*:* cpe:2.3:a:vercel:next.js:15.6.0:canary50:*:*:*:node.js:*:* cpe:2.3:a:vercel:next.js:15.6.0:canary51:*:*:*:node.js:*:* cpe:2.3:a:vercel:next.js:15.6.0:canary52:*:*:*:node.js:*:* cpe:2.3:a:vercel:next.js:15.6.0:canary53:*:*:*:node.js:*:* cpe:2.3:a:vercel:next.js:15.6.0:canary54:*:*:*:node.js:*:* cpe:2.3:a:vercel:next.js:15.6.0:canary55:*:*:*:node.js:*:* cpe:2.3:a:vercel:next.js:15.6.0:canary56:*:*:*:node.js:*:* cpe:2.3:a:vercel:next.js:15.6.0:canary57:*:*:*:node.js:*:* cpe:2.3:a:vercel:next.js:15.6.0:canary58:*:*:*:node.js:*:* cpe:2.3:a:vercel:next.js:15.6.0:canary59:*:*:*:node.js:*:* cpe:2.3:a:vercel:next.js:15.6.0:canary5:*:*:*:node.js:*:* cpe:2.3:a:vercel:next.js:15.6.0:canary6:*:*:*:node.js:*:* cpe:2.3:a:vercel:next.js:15.6.0:canary7:*:*:*:node.js:*:* cpe:2.3:a:vercel:next.js:15.6.0:canary8:*:*:*:node.js:*:* cpe:2.3:a:vercel:next.js:15.6.0:canary9:*:*:*:node.js:*:* cpe:2.3:a:vercel:next.js:16.1.0:-:*:*:*:node.js:*:* cpe:2.3:a:vercel:next.js:16.1.0:canary0:*:*:*:node.js:*:* cpe:2.3:a:vercel:next.js:16.1.0:canary10:*:*:*:node.js:*:* cpe:2.3:a:vercel:next.js:16.1.0:canary11:*:*:*:node.js:*:* cpe:2.3:a:vercel:next.js:16.1.0:canary12:*:*:*:node.js:*:* cpe:2.3:a:vercel:next.js:16.1.0:canary13:*:*:*:node.js:*:* cpe:2.3:a:vercel:next.js:16.1.0:canary14:*:*:*:node.js:*:* cpe:2.3:a:vercel:next.js:16.1.0:canary15:*:*:*:node.js:*:* cpe:2.3:a:vercel:next.js:16.1.0:canary16:*:*:*:node.js:*:* cpe:2.3:a:vercel:next.js:16.1.0:canary17:*:*:*:node.js:*:* cpe:2.3:a:vercel:next.js:16.1.0:canary18:*:*:*:node.js:*:* cpe:2.3:a:vercel:next.js:16.1.0:canary1:*:*:*:node.js:*:* cpe:2.3:a:vercel:next.js:16.1.0:canary2:*:*:*:node.js:*:* cpe:2.3:a:vercel:next.js:16.1.0:canary3:*:*:*:node.js:*:* cpe:2.3:a:vercel:next.js:16.1.0:canary4:*:*:*:node.js:*:* cpe:2.3:a:vercel:next.js:16.1.0:canary5:*:*:*:node.js:*:* cpe:2.3:a:vercel:next.js:16.1.0:canary6:*:*:*:node.js:*:* cpe:2.3:a:vercel:next.js:16.1.0:canary7:*:*:*:node.js:*:* cpe:2.3:a:vercel:next.js:16.1.0:canary8:*:*:*:node.js:*:* cpe:2.3:a:vercel:next.js:16.1.0:canary9:*:*:*:node.js:*:* |
|
| Vendors & Products |
Facebook react
Vercel Vercel next.js |
Fri, 12 Dec 2025 09:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Facebook
Facebook react-server-dom-parcel Facebook react-server-dom-turbopack Facebook react-server-dom-webpack |
|
| Vendors & Products |
Facebook
Facebook react-server-dom-parcel Facebook react-server-dom-turbopack Facebook react-server-dom-webpack |
Thu, 11 Dec 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An information leak vulnerability exists in specific configurations of React Server Components versions 19.0.0, 19.0.1 19.1.0, 19.1.1, 19.1.2, 19.2.0 and 19.2.1, including the following packages: react-server-dom-parcel, react-server-dom-turbopack, and react-server-dom-webpack. A specifically crafted HTTP request sent to a vulnerable Server Function may unsafely return the source code of any Server Function. Exploitation requires the existence of a Server Function which explicitly or implicitly exposes a stringified argument. | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Meta
Published:
Updated: 2026-01-07T16:26:47.826Z
Reserved: 2025-08-08T18:21:47.119Z
Link: CVE-2025-55183
Updated: 2026-01-07T16:25:58.340Z
Status : Analyzed
Published: 2025-12-11T20:16:00.460
Modified: 2025-12-12T18:18:19.950
Link: CVE-2025-55183
OpenCVE Enrichment
Updated: 2025-12-12T08:49:23Z
Github GHSA