Denial Of Service And Source Code Exposure In React Server Components
Security researchers have found and disclosed two additional vulnerabilities in React Server Components while attempting to exploit the patches in last week’s critical vulnerability.
These new vulnerabilities do not allow for Remote Code Execution. The patch for React2Shell remains effective at mitigating the Remote Code Execution exploit.
We recommend upgrading immediately due to the severity of the newly disclosed vulnerabilities.
If you already updated for the Critical Security Vulnerability, you will need to update again.
Please see the instructions in the previous post for upgrade steps.
Further details of these vulnerabilities will be provided after the rollout of the fixes are complete.
These vulnerabilities are present in the same packages and versions as CVE-2025-55182.
This includes versions 19.0.0, 19.0.1 19.1.0, 19.1.1, 19.1.2, 19.2.0 and 19.2.1 of:
Fixes were backported to versions 19.0.2, 19.1.3, and 19.2.2. If you are using any of the above packages please upgrade to any of the fixed versions immediately.
As before, if your app’s React code does not use a server, your app is not affected by these vulnerabilities. If your app does not use a framework, bundler, or bundler plugin that supports React Server Components, your app is not affected by these vulnerabilities.
Source: HackerNews