Critical Vulnerabilities in React Server Components and Next... #1634
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
🤖 Automated Content Update
This PR was automatically generated by the HackTricks News Bot based on a technical blog post.
📝 Source Information
🎯 Content Summary
This post analyzes critical remote code execution (RCE) vulnerabilities in the React Server Components (RSC) ecosystem, tracked as
CVE-2025-55182(React) andCVE-2025-66478(Next.js). Both are rated CVSS 10.0. CVE-2025-66478 has since been formally rejected as a duplicate of CVE-2025-55182, but remains useful as a reference in Next.js advisories.How React Server Components and Flight Are Involved
R...
🔧 Technical Details
Abusing Insecure Flight Deserialization in React Server Components for RCE
The key trick is to treat the React Server Components Flight protocol as an attack surface: any HTTP endpoint that deserializes RSC payloads with vulnerable
react-server/react-server-dom-*code can be driven into arbitrary server-side JavaScript execution. Instead of supplying benign serialized component state, an attacker sends a specially crafted (but structurally valid enough) Flight payload in aPOSTrequest. Because the server’s Flight deserializer does not sufficiently validate which objects and operations can be reconstructed from this data, attacker-controlled fields end up steering server-side control flow. In any stack where React 19 RSC is enabled, the exploitation pattern is: (1) identify the RSC/React Server Function endpoint, (2) send crafted Flight messages, (3) cause the RSC runtime to materialize components or logic paths that exec...🤖 Agent Actions
Summary:
Tests: Not run (not applicable).
This PR was automatically created by the HackTricks Feed Bot. Please review the changes carefully before merging.