diff --git a/http/cves/2025/CVE-2025-55182.yaml b/http/cves/2025/CVE-2025-55182.yaml new file mode 100644 index 00000000000..e87d0f2c2f5 --- /dev/null +++ b/http/cves/2025/CVE-2025-55182.yaml @@ -0,0 +1,50 @@ +id: CVE-2025-55182 + +info: + name: React Server Components - Remote Code Execution (Detection) + author: DhiyaneshDk + severity: critical + description: | + React Server Components 19.0.0, 19.1.0, 19.1.1, and 19.2.0 including react-server-dom-parcel, react-server-dom-turbopack, and react-server-dom-webpack contain a remote code execution caused by unsafe deserialization of payloads from HTTP requests to Server Function endpoints, letting unauthenticated attackers execute arbitrary code remotely, exploit requires no authentication. + impact: | + Unauthenticated attackers can execute arbitrary code remotely, potentially leading to full system compromise. + remediation: | + Update to the latest version that fixes the unsafe deserialization issue. + reference: + - https://github.com/fatguru/CVE-2025-55182-scanner + - https://www.facebook.com/security/advisories/cve-2025-55182 + - http://www.openwall.com/lists/oss-security/2025/12/03/4 + - https://react.dev/blog/2025/12/03/critical-security-vulnerability-in-react-server-components + metadata: + verified: true + max-request: 1 + shodan-query: http.component:"Next.js" + tags: cve,cve2025,react,rce,detect + +http: + - raw: + - | + POST / HTTP/1.1 + Host: {{Hostname}} + Accept: text/x-component + Content-Type: text/plain;charset=UTF-8 + Next-Action: non_existent_action_id + RSC: 1 + + [] + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "/_next/static/" + + - type: word + part: content_type + words: + - "text/x-component" + + - type: status + status: + - 200