Tools

News

Notícias

Classificados

Cursos

Broker

IPv4:

IPv6:

 

UpOrDown
Ping
MTR
Smokeping
MTU Detect
Portscan
DNS
HTTP/SSL
My IP
IP Calc
IP Extractor

React Server Flaw Triggers Maximum Severity

Image © Arstechnica
Open-source React Server components have a critical vulnerability rated at the maximum severity, allowing remote attackers to execute arbitrary code on targeted servers with a single HTTP request and no authentication. Public exploit code has appeared, prompting urgent patching across web apps and cloud deployments.

A maximum-severity vulnerability in the React Server components has been disclosed, potentially enabling attackers to run arbitrary code on affected servers with no authentication. The flaw, tracked as CVE-2025-55182, lies in the server-side rendering workflow of React Server Components and can be triggered by a crafted HTTP request. Public exploit code has emerged, heightening the urgency for immediate patches across affected deployments.

React is widely embedded in web apps and cloud environments, with estimates placing its reach at about 6% of all websites and 39% of cloud deployments. When users reload a page, React can re-render only parts that changed, which accelerates delivery and reduces server load—but that same layer can become a vector for compromise when malformed inputs reach the integration point.

Security researchers describe the flaw as an unsafe deserialization pathway that enables remote code execution. In independent testing, security outfit Wiz reported near-100% reliability for exploitation, citing how a single HTTP request can compromise server control. The vulnerability potentially affects a range of frameworks and libraries that ship React implementations by default—including Next.js, Vite and Parcel RSC plugins, React Router RSC previews, RedwoodSDK, Waku, and others.

Reaction from the security community has been swift: maintainers issued patches and urged administrators to update to patched React versions and dependent libraries. The rapid availability of fixes underscores the need for organizations to vet their dependencies and perform comprehensive updates across dependent stacks.

Mitigation steps include upgrading React to the patched version, auditing third-party components for RSC usage, and running vulnerability scanning across cloud and on-premises environments. Administrators should monitor network traffic for anomalous HTTP requests and consult framework maintainers for guidance on securing deployments and verifying that all affected components are updated.

 

Arstechnica

Notícias relacionadas

IRIS aponta dificuldades de dados de conectividade
Skeelo amplia atuação no México com R$60 milhões
Lightera inaugura fábrica de cabos ópticos no México
Cloudflare cai; sites exibem erro 500 global
Crimes Organizados e Outorgas no SCM
Selo Anatel: cancelamento sem fidelidade após queda

O ISP.Tools sobrevive graças aos anúncios.

Considere desativar seu bloqueador de anúncios.
Prometemos não ser intrusivos.

Consentimento para cookies

Utilizamos cookies para melhorar a sua experiência no nosso site.

Ao utilizar o nosso site, você concorda com o uso de cookies. Saiba mais