Critical RCE Vulnerability in React Server Components Exposes Next.js and Vercel Ecosystems
A critical remote code execution (RCE) vulnerability has been identified within React Server Components, directly impacting major frameworks like Next.js. The flaw, stemming from insecure deserialization in the React Flight protocol, enables unauthenticated attackers to execute arbitrary code on the server. This exposure was specifically flagged in the project `genesis-management-master` on Vercel, highlighting a direct path for exploitation.
The vulnerability is formally tracked under multiple advisories: GitHub Security Advisory GHSA-9qr9-h5gf-34mp, React's CVE-2025-55182, and Next.js's CVE-2025-66478. Vercel has issued an automated pull request to assist with patching but explicitly warns it cannot guarantee comprehensiveness and may contain errors, urging developers to review their guidance before merging any changes. This automated response underscores the urgency and potential complexity of the remediation effort.
The discovery places immense pressure on the vast ecosystem of applications built with React Server Components and Next.js, a cornerstone of modern web development often deployed on Vercel's infrastructure. While patches are available, the automated and non-guaranteed nature of the initial fix, combined with the severity of unauthenticated RCE, signals a period of heightened risk and required scrutiny for development teams globally to manually verify their security posture.