React Server Components - Remote Code Execution (Detection)

This commit is contained in:
Dhiyaneshwaran
2025-12-04 05:25:42 +05:30
committed by GitHub
parent ec38ae378e
commit e75dbe45e3

View File

@@ -0,0 +1,50 @@
id: CVE-2025-55182
info:
name: React Server Components - Remote Code Execution (Detection)
author: DhiyaneshDk
severity: critical
description: |
React Server Components 19.0.0, 19.1.0, 19.1.1, and 19.2.0 including react-server-dom-parcel, react-server-dom-turbopack, and react-server-dom-webpack contain a remote code execution caused by unsafe deserialization of payloads from HTTP requests to Server Function endpoints, letting unauthenticated attackers execute arbitrary code remotely, exploit requires no authentication.
impact: |
Unauthenticated attackers can execute arbitrary code remotely, potentially leading to full system compromise.
remediation: |
Update to the latest version that fixes the unsafe deserialization issue.
reference:
- https://github.com/fatguru/CVE-2025-55182-scanner
- https://www.facebook.com/security/advisories/cve-2025-55182
- http://www.openwall.com/lists/oss-security/2025/12/03/4
- https://react.dev/blog/2025/12/03/critical-security-vulnerability-in-react-server-components
metadata:
verified: true
max-request: 1
shodan-query: http.component:"Next.js"
tags: cve,cve2025,react,rce,detect
http:
- raw:
- |
POST / HTTP/1.1
Host: {{Hostname}}
Accept: text/x-component
Content-Type: text/plain;charset=UTF-8
Next-Action: non_existent_action_id
RSC: 1
[]
matchers-condition: and
matchers:
- type: word
part: body
words:
- "/_next/static/"
- type: word
part: content_type
words:
- "text/x-component"
- type: status
status:
- 200