CVE-2025-55182
03.12.2025, 16:15
A pre-authentication remote code execution vulnerability exists in React Server Components versions 19.0.0, 19.1.0, 19.1.1, and 19.2.0 including the following packages: react-server-dom-parcel, react-server-dom-turbopack, and react-server-dom-webpack. The vulnerable code unsafely deserializes payloads from HTTP requests to Server Function endpoints.Enginsight
| Vendor | Product | Version |
|---|---|---|
| react | 19.0.0 | |
| react | 19.1.0 | |
| react | 19.1.1 | |
| react | 19.2.0 | |
| vercel | next.js | 15.0.0 ≤ 𝑥 < 15.0.5 |
| vercel | next.js | 15.1.0 ≤ 𝑥 < 15.1.9 |
| vercel | next.js | 15.2.0 ≤ 𝑥 < 15.2.6 |
| vercel | next.js | 15.3.0 ≤ 𝑥 < 15.3.6 |
| vercel | next.js | 15.4.0 ≤ 𝑥 < 15.4.8 |
| vercel | next.js | 15.5.0 ≤ 𝑥 < 15.5.7 |
| vercel | next.js | 16.0.0 ≤ 𝑥 < 16.0.7 |
| vercel | next.js | 14.3.0:canary77 |
| vercel | next.js | 14.3.0:canary78 |
| vercel | next.js | 14.3.0:canary79 |
| vercel | next.js | 14.3.0:canary80 |
| vercel | next.js | 14.3.0:canary81 |
| vercel | next.js | 14.3.0:canary82 |
| vercel | next.js | 14.3.0:canary83 |
| vercel | next.js | 14.3.0:canary84 |
| vercel | next.js | 14.3.0:canary85 |
| vercel | next.js | 14.3.0:canary86 |
| vercel | next.js | 14.3.0:canary87 |
| vercel | next.js | 15.6.0 |
| vercel | next.js | 15.6.0:canary0 |
| vercel | next.js | 15.6.0:canary1 |
| vercel | next.js | 15.6.0:canary10 |
| vercel | next.js | 15.6.0:canary11 |
| vercel | next.js | 15.6.0:canary12 |
| vercel | next.js | 15.6.0:canary13 |
| vercel | next.js | 15.6.0:canary14 |
| vercel | next.js | 15.6.0:canary15 |
| vercel | next.js | 15.6.0:canary16 |
| vercel | next.js | 15.6.0:canary17 |
| vercel | next.js | 15.6.0:canary18 |
| vercel | next.js | 15.6.0:canary19 |
| vercel | next.js | 15.6.0:canary2 |
| vercel | next.js | 15.6.0:canary20 |
| vercel | next.js | 15.6.0:canary21 |
| vercel | next.js | 15.6.0:canary22 |
| vercel | next.js | 15.6.0:canary23 |
| vercel | next.js | 15.6.0:canary24 |
| vercel | next.js | 15.6.0:canary25 |
| vercel | next.js | 15.6.0:canary26 |
| vercel | next.js | 15.6.0:canary27 |
| vercel | next.js | 15.6.0:canary28 |
| vercel | next.js | 15.6.0:canary29 |
| vercel | next.js | 15.6.0:canary3 |
| vercel | next.js | 15.6.0:canary30 |
| vercel | next.js | 15.6.0:canary31 |
| vercel | next.js | 15.6.0:canary32 |
| vercel | next.js | 15.6.0:canary33 |
| vercel | next.js | 15.6.0:canary34 |
| vercel | next.js | 15.6.0:canary35 |
| vercel | next.js | 15.6.0:canary36 |
| vercel | next.js | 15.6.0:canary37 |
| vercel | next.js | 15.6.0:canary38 |
| vercel | next.js | 15.6.0:canary39 |
| vercel | next.js | 15.6.0:canary4 |
| vercel | next.js | 15.6.0:canary40 |
| vercel | next.js | 15.6.0:canary41 |
| vercel | next.js | 15.6.0:canary42 |
| vercel | next.js | 15.6.0:canary43 |
| vercel | next.js | 15.6.0:canary44 |
| vercel | next.js | 15.6.0:canary45 |
| vercel | next.js | 15.6.0:canary46 |
| vercel | next.js | 15.6.0:canary47 |
| vercel | next.js | 15.6.0:canary48 |
| vercel | next.js | 15.6.0:canary49 |
| vercel | next.js | 15.6.0:canary5 |
| vercel | next.js | 15.6.0:canary50 |
| vercel | next.js | 15.6.0:canary51 |
| vercel | next.js | 15.6.0:canary52 |
| vercel | next.js | 15.6.0:canary53 |
| vercel | next.js | 15.6.0:canary54 |
| vercel | next.js | 15.6.0:canary55 |
| vercel | next.js | 15.6.0:canary56 |
| vercel | next.js | 15.6.0:canary57 |
| vercel | next.js | 15.6.0:canary6 |
| vercel | next.js | 15.6.0:canary7 |
| vercel | next.js | 15.6.0:canary8 |
| vercel | next.js | 15.6.0:canary9 |
| vercel | next.js | 16.0.0 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
Vulnerability Media Exposure
References