Critical RSC flaws in React and Next.js enable unauthenticated remote code execution; users should update to patched versions ...
如果你在用 React 19 / Next.js 15 / 16, 这篇就当是一个温柔但坚决的催命信: Vercel 已经出手,在它的全球 Web Application Firewall(WAF)上, 加了一层拦截规则,免费帮所有托管在上面的项目挡一波。
11月29日, Lachlan Davidson 报告了React Server Components(RSC)中一个未经身份验证的远程代码执行(RCE)漏洞。该漏洞于12月3日公开披露,并被追踪为 CVE-2025-55182 ...
React2Shell (CVE-2025-55182) is a critical vulnerability affecting the most widely used React-based services across the web ...
A maximum severity vulnerability, dubbed 'React2Shell', in the React Server Components (RSC) 'Flight' protocol allows remote code execution without authentication in React and Next.js applications.
Plane 1.2.0 rebuilt its frontend stack, migrating from Next.js to React Router and Vite, and fixed critical security ...
此漏洞被披露为 CVE-2025-55182,并被评为 CVSS 10.0。React Server Functions 允许客户端调用服务器上的函数,React 将客户端的请求转换为 HTTP 请求,并将这些请求转发到服务器。在服务器上,React 将 HTTP 请求转换为函数调用,并将所需数据返回给客户端。 未经身份验证的攻击者可以构造一个恶意的 HTTP 请求,发送到任何 Server ...
Critical vulnerability in React library should be treated by IT as they did Log4j - as an emergency, warns one expert.
React团队于12月3日发布了有史以来最严重的安全漏洞公告(CVE-2025-55182),该漏洞被评为CVSS 10.0分——最高风险等级。 这一被称为“React2shell”的漏洞,堪比一把开启服务器大门的“万能钥匙”,攻击者无需任何身份验证,仅需发送一个精心构造的HTTP请求,便可直接控制企业服务器。
A newly discovered security flaw in the React ecosystem — one of the most widely used technologies on the web — is prompting ...