Cookies Notice
This site uses cookies to deliver services and to analyze traffic.
📣 New: Apiiro launches AI SAST
On December 3, 2025, coordinated disclosures revealed critical remote code execution (RCE) vulnerabilities in React Server Components (RSC) and Next.js:
At the core, the issue is unsafe deserialization in the RSC “Flight” protocol. With a single crafted HTTP request to an exposed RSC / Server Function endpoint, an attacker can reach pre-auth arbitrary code execution on the server. This has been rated CVSS 10.0 (Critical).
For teams running React 19 and Next.js App Router in production, this is the kind of incident that deserves “drop-everything” priority.
React 19 introduced a more powerful server model: React Server Components. UI is split between client and server, with component trees and server function calls serialized over a transport format commonly called the RSC “Flight” protocol.
The vulnerable RSC implementations:
The problem: the deserialization logic trusted attacker-controlled data too much. Malformed but syntactically valid payloads could:
Because this logic runs before routing and authentication, exploit attempts don’t need valid credentials or special access. A single HTTP request to an RSC endpoint is enough to attempt RCE under default configurations.
React RSC packages: The following React 19 RSC packages are affected in versions: 19.0.0, 19.1.0, 19.1.1, 19.2.0
Next.js: Next.js is affected when using App Router / RSC features on:
Because the RSC engine is also embedded elsewhere, the following are likely affected if they bundle vulnerable react-server-dom-* versions:
This is where an accurate app-to-dependency map really matters: you want to know not only which packages are vulnerable, but which services and which environments are
If some environments can’t be patched immediately, add defense-in-depth around exposed RSC endpoints:
Incidents like these put two capabilities to the test: how fast you can understand your exposure, and how disciplined your remediation workflow is. Here’s how Apiiro fits into the response:
React Server Components are a powerful evolution in how we build modern web apps — but the RSC “Flight” protocol vulnerability shows how quickly that power can turn into risk when deserialization, server execution, and internet exposure intersect.
The good news: the ecosystem reacted quickly, patches are out, and there’s clear guidance for what to do. The bad news: the blast radius is wide, and the exploit conditions are almost ideal from an attacker’s point of view.
If you’re running React 19 with RSC, Next.js 15/16, or any RSC-enabled framework in production, now is the time to:
Not every critical vulnerability becomes “the next Log4Shell.” But the ones that could demand you treat them like they might.