react

Back Open Paginator
04.12.2025 01:03
offseq (@offseq@infosec.exchange)

🚨 CRITICAL: React & Next.js RSC bugs enable unauthenticated RCE on public servers. No CVE yet, but risk of server takeover is high. Restrict server access, monitor logs, and await patches. Details: radar.offseq.com/threat/critic #OffSeq #React #Nextjs #infosec





Show Original Post


04.12.2025 00:57
timb_machine (@timb_machine@infosec.exchange)

Last one to React is a smelly panda?

github.com/ejpir/CVE-2025-5518

#threatintel, #react




Show Original Post


03.12.2025 23:41
nullagent (@nullagent@partyon.xyz)

There's an epic react server component RCE exploit making the rounds today.

A proof of concept just dropped. Probably wanna patch this rapidly.

github.com/ejpir/CVE-2025-5518

#React #Javascript #Cybersecurity #breaking




Show Original Post


03.12.2025 23:37
SocketSecurity (@SocketSecurity@fosstodon.org)

🚨 React disclosed a critical (CVSS 10.0) RCE in React Server Components. If you use RSC (often via frameworks like Next.js), upgrade react-server-dom-* to patched versions ASAP.

Details → socket.dev/blog/critical-secur #NodeJS #React




Show Original Post


03.12.2025 23:32
habr (@habr@zhub.link)

[Перевод] Критическая уязвимость безопасности в React Server Components

Важное обновление безопасности для React-разработчиков 🛡️ Обнаружена RCE-уязвимость связанная с некорректным декодированием пейлоадов в Server Functions. Это позволяет неаутентифицированным пользователям выполнять код на сервере. Что нужно сделать: Проверьте, используете ли вы React Server Components. Если да (например, в Next.js 15+), выполните обновление пакетов немедленно. Исправления доступны в версиях 19.0.1, 19.1.2 и 19.2.1.

habr.com/ru/articles/973050/

#rce #react




Show Original Post


03.12.2025 22:26
bkoehn (@bkoehn@hachyderm.io)

As vulnerabilities go, a 10 is as bad as it gets. If you use #React or one of its derivatives (e.g., #Nextjs) you should upgrade Right. Now.

cve.org/CVERecord?id=CVE-2025-




Show Original Post


03.12.2025 22:17
afterdawn (@afterdawn@mementomori.social)

Valtavan suositusta JavaScript-kirjastosta Reactista paljastui täyden kympin haavoittuvuus

Vakavimman riskiluokituksen saanut haavoittuvuus mahdollistaa haittakoodin suorittamisen palvelimella ja siihen riittää pelkkä oikein muotoiltu HTTP-kutsu.

Haavoittuvuus koskee myös NextJS:ää.

dawn.fi/uutiset/2025/12/03/rea

#react #nextjs #haavoittuvuus #tietoturva #uutiset




Show Original Post


03.12.2025 22:16
coreice (@coreice@infrastruct.social)

Nice little #NextJS #React - specifically React Server Components - vulnerability dropped with CVSS of 10/10.

nvd.nist.gov/vuln/detail/CVE-2

Which kind of duplicates into CVE-2025-66478 as downstream implementation in NextJS for App Router.

Blogposts:

react.dev/blog/2025/12/03/crit

nextjs.org/blog/CVE-2025-66478




Show Original Post


03.12.2025 20:57
adulau (@adulau@infosec.exchange)

“A pre-authentication remote code execution vulnerability exists in React Server Components versions 19.0.0, 19.1.0, 19.1.1, and 19.2.0 including the following packages: react-server-dom-parcel, react-server-dom-turbopack, and react-server-dom-webpack. The vulnerable code unsafely deserializes payloads from HTTP requests to Server Function endpoints.“

#vulnerability #react #cybersecurity #cve

vulnerability.circl.lu/vuln/CV




Show Original Post


03.12.2025 20:40
ocramius (@ocramius@mastodon.social)

NodeJS is having its Neo4J renaissance




Show Original Post


03.12.2025 20:39
StarkZarn (@StarkZarn@infosec.exchange)

Use javascript for everything, they said... it'll be fine, they said...

wiz.io/blog/critical-vulnerabi

facebook.com/security/advisori

#React #CVE #javascript




Show Original Post


03.12.2025 20:14
winbuzzer (@winbuzzer@mastodon.social)

winbuzzer.com/2025/12/03/sever

Severe React Server Components Flaw Exposes Millions of Apps and Websites





Show Original Post


1 ...99 100 101 102 103 104 105 106 107 108 109 ...180
UP