Critical RCE Vulnerability in React Server Components Exposes Next.js, Vercel Issues Automated Patch
A critical remote code execution (RCE) vulnerability has been identified within React Server Components, directly impacting major frameworks like Next.js. The flaw, rooted in insecure deserialization in the React Flight protocol, enables unauthenticated attackers to execute arbitrary code on the server. This represents a severe security breach for any application using the affected technology stack, potentially granting attackers full control over the underlying server environment.
The vulnerability was discovered in the project 'saas-app-project' and is now formally tracked under multiple advisories: GitHub Security Advisory GHSA-9qr9-h5gf-34mp, React's CVE-2025-55182, and Next.js's CVE-2025-66478. In response, Vercel has generated an automated pull request to assist with patching efforts. However, the company explicitly warns that this automated fix cannot be guaranteed as comprehensive and may contain mistakes, urging developers to conduct thorough reviews before merging the changes.
The disclosure places immediate pressure on development teams worldwide to audit and secure their Next.js and React Server Component implementations. The public release of the CVEs signals that the vulnerability is now in the wild, increasing the risk of exploitation. Organizations must move swiftly to apply the official patches and follow Vercel's supplemental guidance to mitigate the threat of server takeover through this critical deserialization flaw.