Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-55184: (CWE-502) Deserialization of Untrusted Data. (CWE-400) Uncontrolled Resource Consumption in Meta react-server-dom-webpack

0
High
VulnerabilityCVE-2025-55184cvecve-2025-55184cwe-502
Published: Thu Dec 11 2025 (12/11/2025, 20:05:01 UTC)
Source: CVE Database V5
Vendor/Project: Meta
Product: react-server-dom-webpack

Description

A pre-authentication denial of service vulnerability exists in React Server Components versions 19.0.0, 19.0.1 19.1.0, 19.1.1, 19.1.2, 19.2.0 and 19.2.1, including the following packages: react-server-dom-parcel, react-server-dom-turbopack, and react-server-dom-webpack. The vulnerable code unsafely deserializes payloads from HTTP requests to Server Function endpoints, which can cause an infinite loop that hangs the server process and may prevent future HTTP requests from being served.

AI-Powered Analysis

AILast updated: 12/11/2025, 20:19:08 UTC

Technical Analysis

CVE-2025-55184 is a vulnerability in Meta's React Server Components, specifically affecting versions 19.0.0 through 19.2.1 and associated packages like react-server-dom-parcel, react-server-dom-turbopack, and react-server-dom-webpack. The root cause is unsafe deserialization of untrusted data received via HTTP requests targeting Server Function endpoints. This deserialization flaw can lead to an infinite loop within the server process, resulting in uncontrolled resource consumption and effectively causing a denial of service (DoS) condition. The vulnerability does not require any authentication or user interaction, making it remotely exploitable by unauthenticated attackers. The CVSS v3.1 score of 7.5 reflects a high severity, primarily due to the impact on availability (denial of service) and the ease of exploitation (network vector, no privileges required). While no public exploits have been reported yet, the vulnerability's nature suggests that attackers could disrupt web services relying on these React Server Components by sending crafted payloads that trigger the infinite loop. The affected packages are widely used in modern web application development to enable server-side rendering and interactivity, which increases the potential attack surface. The lack of available patches at the time of publication necessitates immediate mitigation strategies to protect affected systems.

Potential Impact

For European organizations, this vulnerability poses a significant risk to the availability of web applications and services built using the affected React Server Components. A successful exploitation can cause server processes to hang indefinitely, leading to denial of service conditions that disrupt business operations, degrade user experience, and potentially cause financial losses. Organizations providing critical online services, e-commerce platforms, or public-facing portals using these components may face service outages. Additionally, the pre-authentication nature of the vulnerability means that attackers can exploit it without any credentials, increasing the likelihood of automated attacks or denial of service campaigns. The impact is particularly severe for high-traffic environments where resource exhaustion can cascade, affecting multiple services or leading to broader infrastructure instability. Given the widespread adoption of React frameworks in Europe’s digital economy, the vulnerability could affect a broad range of sectors including finance, government, healthcare, and technology. The inability to serve legitimate HTTP requests during an attack could also harm organizational reputation and customer trust.

Mitigation Recommendations

1. Immediate mitigation should focus on implementing strict input validation and sanitization for all data received by Server Function endpoints to prevent malicious payloads from triggering unsafe deserialization. 2. Deploy rate limiting and request throttling on endpoints handling Server Function calls to reduce the risk of resource exhaustion from repeated exploit attempts. 3. Isolate the server processes handling React Server Components in separate containers or sandboxes to limit the impact of a potential hang or crash. 4. Monitor server performance and set up alerts for unusual CPU or memory usage patterns indicative of infinite loops or resource consumption spikes. 5. Until official patches are released by Meta, consider temporarily disabling or restricting access to vulnerable Server Function endpoints if feasible. 6. Keep abreast of updates from Meta and apply security patches promptly once available. 7. Conduct thorough code reviews and security testing focusing on deserialization logic and server-side request handling. 8. Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious payloads targeting deserialization endpoints. 9. Educate development teams about secure coding practices related to deserialization and resource management in server-side components.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Meta
Date Reserved
2025-08-08T18:21:47.119Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 693b270d22246175c6965c2d

Added to database: 12/11/2025, 8:18:21 PM

Last enriched: 12/11/2025, 8:19:08 PM

Last updated: 12/12/2025, 7:10:39 AM

Views: 22

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats