{"id":15259,"date":"2025-12-04T00:30:15","date_gmt":"2025-12-04T00:30:15","guid":{"rendered":"https:\/\/newestek.com\/?p=15259"},"modified":"2025-12-04T00:30:15","modified_gmt":"2025-12-04T00:30:15","slug":"developers-urged-to-immediately-upgrade-react-next-js","status":"publish","type":"post","link":"https:\/\/newestek.com\/?p=15259","title":{"rendered":"Developers urged to immediately upgrade React, Next.js"},"content":{"rendered":"<div>\n<div id=\"remove_no_follow\">\n<div class=\"grid grid--cols-10@md grid--cols-8@lg article-column\">\n<div class=\"col-12 col-10@md col-6@lg col-start-3@lg\">\n<div class=\"article-column__content\">\n<section class=\"wp-block-bigbite-multi-title\">\n<div class=\"container\"><\/div>\n<\/section>\n<p>Developers using the <a href=\"https:\/\/react.dev\/\" target=\"_blank\" rel=\"noreferrer noopener\">React 19 library<\/a> for building application interfaces are urged to immediately upgrade to the latest version because of a critical vulnerability that can be easily exploited by an attacker to remotely run their own code.<\/p>\n<p><a href=\"https:\/\/www.wiz.io\/blog\/critical-vulnerability-in-react-cve-2025-55182\" target=\"_blank\" rel=\"noreferrer noopener\">Researchers at Wiz said Wednesday<\/a> that a vulnerability in the React Server Components (RSC) Flight protocol affects the React 19 ecosystem, as well as frameworks that implement it. In particular, that means Next.js, a popular full stack development framework built on top of React, which received a separate CVE.\u00a0<\/p>\n<p>RSC Flight protocol powers communication between the client and server for React Server Components, sending serialized component trees over the wire from the server to the client.<\/p>\n<p>\u201cThe vulnerability exists in the default configuration of affected applications, meaning standard deployments are immediately at risk,\u201d says the warning. \u201cDue to the high severity and the ease of exploitation, immediate patching is required,\u201d\u00a0<\/p>\n<p>\u201cOur exploitation tests show that a standard Next.js application created via\u00a0<em>create-next-app<\/em>\u00a0and built for production is vulnerable without any specific code modifications by the developer,\u201d Wiz also\u00a0warns.<\/p>\n<p>The problem in React\u2019s server package, designated <a href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2025-55182\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2025-55182<\/a>, is a logical deserialization vulnerability allowing the server to processes RSC payloads in an unsafe way.\u00a0When a server receives a specially crafted, malformed payload, say Wiz researchers, it fails to validate the structure correctly. This allows attacker-controlled data to influence server-side execution logic, resulting in the execution of privileged JavaScript code.<\/p>\n<p>\u201cIn simple terms,\u201d Wiz said in response to questions, \u201cthe server takes input from a user, trusts it too much, and processes it into code-like objects which attackers can exploit to run commands or leak sensitive information.\u201d<\/p>\n<p>Affected are React versions 19.0.0, 19.1.0, 19.1.1, and 19.2.0. The fix is to upgrade to the latest version of React.<\/p>\n<p>While the vulnerability affects all development frameworks using vulnerable versions of React, the problem in Next.js is specifically identified as <a href=\"https:\/\/github.com\/vercel\/next.js\/security\/advisories\/GHSA-9qr9-h5gf-34mp\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2025-66478<\/a>.<\/p>\n<p>Affected are Next.js 15.x and 16.x using the App Router. Again, the fix is to upgrade to the latest version of Next.js.<\/p>\n<p>React\u2019s blog provides <a href=\"https:\/\/react.dev\/blog\/2025\/12\/03\/critical-security-vulnerability-in-react-server-components\" target=\"_blank\" rel=\"noreferrer noopener\">detailed upgrade instructions<\/a> for both React and Next.js.<\/p>\n<h2 class=\"wp-block-heading\" id=\"serious-vulnerability\">\u2018Serious vulnerability\u2019<\/h2>\n<p>\u201cThe configuration needed for these vulnerabilities to function is extremely common,\u201d Wiz said in response to questions, \u201cand disabling the functionality needed to block them is very rare. In fact, we failed to find any such case.\u201d<\/p>\n<p>Wiz says 39% of cloud environments are currently using Next.js and other web frameworks based on React.\u00a0<\/p>\n<p><a href=\"https:\/\/www.sans.org\/profiles\/dr-johannes-ullrich\" target=\"_blank\" rel=\"noreferrer noopener\">Johannes Ullrich<\/a>, dean of research at the SANS Institute, told <em>InfoWorld <\/em>that RSC is widely used, particularly when the Next.js framework, which implements RSC by default, is employed.<\/p>\n<p>\u201cThis is a very serious vulnerability,\u201d he said in an email. \u201cI expect public exploits to surface within a day or so, and applications must be patched quickly. Some web application firewall vendors, such as Cloudflare, have already implemented rules to protect applications from potential exploits. But even web applications protected by these systems should be patched, in case attackers find ways to bypass these protection mechanisms.\u201d<\/p>\n<p>To exploit the React vulnerability, all a threat actor would need to do is send a specially crafted HTTP request to the server endpoint. For security reasons, Wiz researchers didn\u2019t detail how this could be done. But, they said, in similar vulnerabilities, attackers leverage remote code execution on servers to download and execute sophisticated trojans on the server, usually a known C2 framework like <em>sliver,<\/em> but in some cases, a more custom payload. \u201cThe main point,\u201d the researchers said, \u201cis that with an RCE like this, an attacker can practically do anything.\u201d<\/p>\n<p>CISOs and developers need to treat these two vulnerabilities as \u201cmore than critical,\u201d said <a href=\"https:\/\/shehackspurple.ca\/\" target=\"_blank\" rel=\"noreferrer noopener\">Tanya Janca<\/a>, a Canadian-based secure coding trainer. In fact, she said in an email, they should be treated in the same way that infosec pros treated<a href=\"https:\/\/www.csoonline.com\/article\/571789\/how-to-properly-mitigate-the-log4j-vulnerabilities.html\" target=\"_blank\"> the Log4j vulnerability<\/a>, and scour all applications. \u201cThere could not be a more serious security flaw in a web application than this,\u201d she said, \u201ceven if it is not known to be exploited in the wild yet.\u201d<\/p>\n<h2 class=\"wp-block-heading\" id=\"advice-for-csos-developers\">Advice for CSOs, developers<\/h2>\n<p>Janca said developers should:<\/p>\n<ul class=\"wp-block-list\">\n<li>make a list of all apps using React or Next.js;<\/li>\n<li>check if they use any of the known vulnerable versions: React: 19.0 \/ 19.1.0 \/ 19.1.1 \/ 19.2.0, and Next.js: 14.3.0-canary.77 and later canary releases, 15.x\/16.x<br \/>if so, upgrade to a safe version:\n<ul>\n<li>React: 19.0.1, 19.1.2, 19.2.1 or better<\/li>\n<\/ul>\n<ul class=\"wp-block-list\">\n<li>Next.js: 15.0.5, 15.1.9, 15.2.6, 15.3.6, 15.4.8, 15.5.7, 16.0.7 or later; if on Next.js 14.3.0-canary.77 or a later canary release, downgrade to the latest stable 14.x release;<\/li>\n<\/ul>\n<\/li>\n<li>scan with a software composition analysis tool to see if the vulnerable versions are used in unexpected places;<\/li>\n<li>if, for some reason, they can\u2019t be upgraded, assume those apps are unsafe and turn them off if possible. If they can\u2019t be disabled, treat them like a bomb went off and put a network firewall around them, monitor them and work with the security team on it;<\/li>\n<li>infosec pros should read app logs and look for strange behavior;<\/li>\n<li>keep the security team informed;<\/li>\n<\/ul>\n<p>Most importantly, she said, treat this as an emergency.<\/p>\n<p><em>This article originally appeared on <a href=\"https:\/\/www.infoworld.com\/article\/4100641\/developers-urged-to-immediately-upgrade-react-next-js.html\" target=\"_blank\">InfoWorld<\/a>.<\/em><\/p>\n<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Developers using the React 19 library for building application interfaces are urged to immediately upgrade to the latest version because of a critical vulnerability that can be easily exploited by an attacker to remotely run their own code. Researchers at Wiz said Wednesday that a vulnerability in the React Server Components (RSC) Flight protocol affects the React 19 ecosystem, as well as frameworks that implement&#8230; <\/p>\n<p class=\"more\"><a class=\"more-link\" href=\"https:\/\/newestek.com\/?p=15259\">Read More<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-15259","post","type-post","status-publish","format-standard","hentry","category-uncategorized","is-cat-link-borders-light is-cat-link-rounded"],"_links":{"self":[{"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/posts\/15259","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=15259"}],"version-history":[{"count":0,"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/posts\/15259\/revisions"}],"wp:attachment":[{"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=15259"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=15259"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=15259"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}