CVE-2025-55184: (CWE-502) Deserialization of Untrusted Data. (CWE-400) Uncontrolled Resource Consumption in Meta react-server-dom-webpack
A pre-authentication denial of service vulnerability exists in React Server Components versions 19.0.0, 19.0.1 19.1.0, 19.1.1, 19.1.2, 19.2.0 and 19.2.1, including the following packages: react-server-dom-parcel, react-server-dom-turbopack, and react-server-dom-webpack. The vulnerable code unsafely deserializes payloads from HTTP requests to Server Function endpoints, which can cause an infinite loop that hangs the server process and may prevent future HTTP requests from being served.
AI Analysis
Technical Summary
CVE-2025-55184 is a vulnerability identified in Meta's React Server Components, specifically in versions 19.0.0, 19.0.1, 19.1.0, 19.1.1, 19.1.2, 19.2.0, and 19.2.1, affecting packages such as react-server-dom-parcel, react-server-dom-turbopack, and react-server-dom-webpack. The root cause is unsafe deserialization of untrusted data received via HTTP requests directed at Server Function endpoints. Deserialization is the process of converting data from a format suitable for transmission or storage back into an object or data structure. When this process is performed without proper validation or sanitization, it can lead to severe security issues. In this case, maliciously crafted payloads can cause the server to enter an infinite loop, exhausting resources and causing the server process to hang. This results in a denial of service condition where legitimate HTTP requests cannot be served, impacting the availability of web applications relying on these components. The vulnerability is exploitable remotely without any authentication or user interaction, increasing its risk profile. The CVSS v3.1 base score is 7.5 (high), reflecting the network attack vector, low attack complexity, no privileges required, no user interaction, and a significant impact on availability. Although no public exploits have been reported yet, the vulnerability's nature makes it a critical concern for organizations using these React Server Components in production environments. The issue is related to CWE-502 (Deserialization of Untrusted Data) and CWE-400 (Uncontrolled Resource Consumption), both well-known classes of vulnerabilities that can lead to denial of service or remote code execution in other contexts. The lack of patches at the time of reporting means organizations must rely on mitigations until official fixes are released.
Potential Impact
For European organizations, the primary impact of CVE-2025-55184 is denial of service, which can disrupt web services and applications built using affected React Server Components. This can lead to downtime, loss of customer trust, and potential financial losses, especially for e-commerce, online services, and critical infrastructure relying on these technologies. The vulnerability’s pre-authentication nature means attackers can exploit it without credentials, increasing the risk of widespread attacks. Organizations with high traffic websites or those providing essential services may experience significant operational disruptions. Additionally, prolonged outages could affect compliance with European regulations such as GDPR if service availability commitments are not met. The impact is mostly on availability; confidentiality and integrity are not directly affected. The risk is heightened in countries with large digital economies and extensive use of React-based frameworks in web development, where attackers may target high-profile or critical service providers to maximize disruption.
Mitigation Recommendations
1. Monitor Meta’s official channels for patches addressing CVE-2025-55184 and apply them promptly once available. 2. Until patches are released, implement strict input validation and sanitization on all data received by Server Function endpoints to prevent malicious payloads from triggering unsafe deserialization. 3. Deploy Web Application Firewalls (WAFs) with custom rules to detect and block suspicious payloads targeting react-server-dom-webpack endpoints. 4. Implement rate limiting on HTTP requests to Server Function endpoints to reduce the risk of resource exhaustion from repeated malicious requests. 5. Consider isolating or sandboxing the server processes handling deserialization to limit the impact of potential infinite loops or hangs. 6. Conduct thorough code reviews and security testing focusing on deserialization logic in React Server Components. 7. Prepare incident response plans to quickly identify and mitigate denial of service attacks exploiting this vulnerability. 8. Educate development teams about the risks of unsafe deserialization and best practices for secure coding in React Server Components.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Ireland
CVE-2025-55184: (CWE-502) Deserialization of Untrusted Data. (CWE-400) Uncontrolled Resource Consumption in Meta react-server-dom-webpack
Description
A pre-authentication denial of service vulnerability exists in React Server Components versions 19.0.0, 19.0.1 19.1.0, 19.1.1, 19.1.2, 19.2.0 and 19.2.1, including the following packages: react-server-dom-parcel, react-server-dom-turbopack, and react-server-dom-webpack. The vulnerable code unsafely deserializes payloads from HTTP requests to Server Function endpoints, which can cause an infinite loop that hangs the server process and may prevent future HTTP requests from being served.
AI-Powered Analysis
Technical Analysis
CVE-2025-55184 is a vulnerability identified in Meta's React Server Components, specifically in versions 19.0.0, 19.0.1, 19.1.0, 19.1.1, 19.1.2, 19.2.0, and 19.2.1, affecting packages such as react-server-dom-parcel, react-server-dom-turbopack, and react-server-dom-webpack. The root cause is unsafe deserialization of untrusted data received via HTTP requests directed at Server Function endpoints. Deserialization is the process of converting data from a format suitable for transmission or storage back into an object or data structure. When this process is performed without proper validation or sanitization, it can lead to severe security issues. In this case, maliciously crafted payloads can cause the server to enter an infinite loop, exhausting resources and causing the server process to hang. This results in a denial of service condition where legitimate HTTP requests cannot be served, impacting the availability of web applications relying on these components. The vulnerability is exploitable remotely without any authentication or user interaction, increasing its risk profile. The CVSS v3.1 base score is 7.5 (high), reflecting the network attack vector, low attack complexity, no privileges required, no user interaction, and a significant impact on availability. Although no public exploits have been reported yet, the vulnerability's nature makes it a critical concern for organizations using these React Server Components in production environments. The issue is related to CWE-502 (Deserialization of Untrusted Data) and CWE-400 (Uncontrolled Resource Consumption), both well-known classes of vulnerabilities that can lead to denial of service or remote code execution in other contexts. The lack of patches at the time of reporting means organizations must rely on mitigations until official fixes are released.
Potential Impact
For European organizations, the primary impact of CVE-2025-55184 is denial of service, which can disrupt web services and applications built using affected React Server Components. This can lead to downtime, loss of customer trust, and potential financial losses, especially for e-commerce, online services, and critical infrastructure relying on these technologies. The vulnerability’s pre-authentication nature means attackers can exploit it without credentials, increasing the risk of widespread attacks. Organizations with high traffic websites or those providing essential services may experience significant operational disruptions. Additionally, prolonged outages could affect compliance with European regulations such as GDPR if service availability commitments are not met. The impact is mostly on availability; confidentiality and integrity are not directly affected. The risk is heightened in countries with large digital economies and extensive use of React-based frameworks in web development, where attackers may target high-profile or critical service providers to maximize disruption.
Mitigation Recommendations
1. Monitor Meta’s official channels for patches addressing CVE-2025-55184 and apply them promptly once available. 2. Until patches are released, implement strict input validation and sanitization on all data received by Server Function endpoints to prevent malicious payloads from triggering unsafe deserialization. 3. Deploy Web Application Firewalls (WAFs) with custom rules to detect and block suspicious payloads targeting react-server-dom-webpack endpoints. 4. Implement rate limiting on HTTP requests to Server Function endpoints to reduce the risk of resource exhaustion from repeated malicious requests. 5. Consider isolating or sandboxing the server processes handling deserialization to limit the impact of potential infinite loops or hangs. 6. Conduct thorough code reviews and security testing focusing on deserialization logic in React Server Components. 7. Prepare incident response plans to quickly identify and mitigate denial of service attacks exploiting this vulnerability. 8. Educate development teams about the risks of unsafe deserialization and best practices for secure coding in React Server Components.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Meta
- Date Reserved
- 2025-08-08T18:21:47.119Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 693b270d22246175c6965c2d
Added to database: 12/11/2025, 8:18:21 PM
Last enriched: 12/19/2025, 5:12:59 AM
Last updated: 2/7/2026, 9:19:32 AM
Views: 139
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2080: Command Injection in UTT HiPER 810
HighCVE-2026-2079: Improper Authorization in yeqifu warehouse
MediumCVE-2026-1675: CWE-1188 Initialization of a Resource with an Insecure Default in brstefanovic Advanced Country Blocker
MediumCVE-2026-1643: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ariagle MP-Ukagaka
MediumCVE-2026-1634: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in alexdtn Subitem AL Slider
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.