
The React team has disclosed additional security vulnerabilities affecting React Server Components, discovered while researchers were testing the effectiveness of last week’s critical patch (React2Shell). While these newly identified issues do not enable Remote Code Execution, they introduce serious risks, including Denial of Service (DoS) attacks and potential source code exposure. Due to their severity, immediate upgrades are strongly recommended.
Security researchers identified two new vulnerability classes in the same React Server Components packages affected by CVE-2025-55182.
CVE-2025-55184
CVE-2025-67779
CVSS Score: 7.5 (High)
A maliciously crafted HTTP request sent to a Server Function endpoint can trigger an infinite loop during deserialization, causing the server process to hang and consume CPU indefinitely.
Notably, even applications that do not explicitly define Server Functions may still be vulnerable if they support React Server Components.
This vulnerability enables attackers to:
Disrupt service availability
Degrade server performance
Potentially cause cascading infrastructure impact
The React team has confirmed that earlier fixes were incomplete, leaving several patched versions still vulnerable until this latest release.
CVE-2025-55183
CVSS Score: 5.3 (Medium)
Researchers discovered that certain malformed requests could cause Server Functions to return their own source code when arguments are explicitly or implicitly stringified.
This may expose:
Hardcoded secrets inside Server Functions
Internal logic and implementation details
Inlined helper functions, depending on bundler behavior
Important clarification: Only source-level secrets may be exposed. Runtime secrets such as process.env.SECRET are not affected.
The newly disclosed vulnerabilities impact the same React Server Components packages as the previously reported issue, and affect a range of commonly used frameworks and bundlers. Teams should review their dependency tree carefully to determine whether an upgrade is required.
These vulnerabilities affect the same packages and version ranges as the previously disclosed React Server Components issue.
react-server-dom-webpack
react-server-dom-parcel
react-server-dom-turbopack
19.0.0 → 19.0.2
19.1.0 → 19.1.3
19.2.0 → 19.2.2
The React team has backported fixes to the following versions:
19.0.3
19.1.4
19.2.3
If your project uses any of the affected packages, upgrade immediately to one of the versions above.
⚠️ If you already updated last week, you still need to update again. Versions 19.0.2, 19.1.3, and 19.2.2 are not fully secure.
Several popular frameworks and tools depend on or bundle the vulnerable packages, including:
Next.js
React Router
Waku
@parcel/rsc
@vite/rsc-plugin
rwsdk
Refer to your framework’s upgrade instructions to ensure the correct patched versions are installed.
Apps that do not use a server
Apps not using React Server Components
Apps not relying on frameworks or bundlers that support RSC
React Native Considerations
React Native applications that do not use monorepos or react-dom are generally not affected by these vulnerabilities. For React Native projects using a monorepo, only the following packages need to be updated if they are installed:
react-server-dom-webpack
react-server-dom-parcel
react-server-dom-turbopack
Upgrading these packages does not require updating react or react-dom and will not cause version mismatch issues in React Native.
While upgrading to the fixed versions is mandatory, these vulnerabilities also expose broader weaknesses in dependency management and secret handling that teams should address to reduce future risk.
All affected applications should upgrade immediately to one of the patched versions:
19.0.3
19.1.4
19.2.3
Previously released patches were incomplete, and hosting provider mitigations should be considered temporary safeguards only, not a long-term solution. Updating to the fixed versions remains the only reliable mitigation.
Modern JavaScript ecosystems make it difficult to manually track security advisories across all dependencies. Using tools such as Renovate or Dependabot helps automatically detect vulnerable versions and create upgrade pull requests as soon as fixes are released. This reduces response time and lowers the risk of running partially patched or outdated packages in production.
Frequent dependency upgrades are only safe when supported by reliable automated testing. Maintaining comprehensive CI/CD pipelines with sufficient test coverage allows teams to apply security updates quickly while minimizing the risk of breaking changes. This enables faster remediation when new vulnerabilities are disclosed.
Secrets embedded directly in source code may be exposed if similar vulnerabilities arise again.
Store secrets using managed services such as AWS SSM Parameter Store or AWS Secrets Manager
Implement key rotation mechanisms without downtime
Even if source code is exposed, properly managed runtime secrets significantly limit real-world impact.
It is common for critical vulnerabilities to uncover additional issues once researchers begin probing adjacent code paths. When an initial fix is released, security researchers often attempt to bypass it using variant exploit techniques. This pattern has appeared repeatedly across the industry.
A well-known example is Log4Shell, where multiple follow-up CVEs were reported after the first disclosure. While additional disclosures can be frustrating, they usually indicate:
Active security review
Responsible disclosure
A healthy patch and verification cycle
Some hosting companies set up quick fixes, yet those aren't enough on their own. Keeping dependencies updated is still a top way to stay safe from new supply-chain risks.
If your application uses React Server Components, reach out to Haposoft now! We'll figure out what’s impacted while taking care of the update without mess. It means going through your dependencies one by one, making sure everything builds right in the end.
