Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-67779: (CWE-502) Deserialization of Untrusted Data, (CWE-400) Uncontrolled Resource Consumption in Meta react-server-dom-parcel

0
High
VulnerabilityCVE-2025-67779cvecve-2025-67779cwe-502
Published: Thu Dec 11 2025 (12/11/2025, 23:36:20 UTC)
Source: CVE Database V5
Vendor/Project: Meta
Product: react-server-dom-parcel

Description

It was found that the fix addressing CVE-2025-55184 in React Server Components was incomplete and does not prevent a denial of service attack in a specific case. React Server Components versions 19.0.2, 19.1.3 and 19.2.2 are affected, allowing unsafe deserialization of payloads from HTTP requests to Server Function endpoints. This can cause an infinite loop that hangs the server process and may prevent future HTTP requests from being served.

AI-Powered Analysis

AILast updated: 12/19/2025, 05:25:26 UTC

Technical Analysis

CVE-2025-67779 is a vulnerability in Meta's react-server-dom-parcel package, specifically affecting versions 19.0.2, 19.1.3, and 19.2.2. The issue stems from unsafe deserialization of untrusted payloads received via HTTP requests to Server Function endpoints in React Server Components. Deserialization is a process where data is converted from a format suitable for transmission or storage back into an executable object. When untrusted data is deserialized without proper validation, it can lead to security issues such as code injection or resource exhaustion. In this case, the vulnerability allows an attacker to craft malicious payloads that cause an infinite loop during deserialization, resulting in uncontrolled resource consumption (CWE-400) and denial of service (DoS). This vulnerability is a regression from a previous fix (CVE-2025-55184) that was intended to address similar issues but was incomplete. The flaw does not impact confidentiality or integrity but severely affects availability by hanging the server process and blocking future HTTP requests. The CVSS v3.1 score is 7.5 (high severity), reflecting network attack vector, low attack complexity, no privileges or user interaction required, and a significant impact on availability. No public exploits have been reported yet, but the vulnerability poses a serious risk to applications relying on the affected React Server Components versions. The lack of patch links indicates that a fix may still be pending or in development. Organizations using these versions should consider immediate mitigation steps to prevent exploitation.

Potential Impact

For European organizations, the primary impact is denial of service against web applications using the affected react-server-dom-parcel versions. This can lead to service outages, degraded user experience, and potential loss of business continuity, especially for customer-facing or critical internal applications built with React Server Components. The vulnerability does not expose sensitive data or allow code execution beyond resource exhaustion, but the resulting downtime can disrupt operations and damage reputation. Industries with high reliance on web services, such as finance, e-commerce, public sector, and telecommunications, are particularly vulnerable. Additionally, the attack requires no authentication or user interaction, increasing the risk of automated exploitation attempts. Organizations with cloud-hosted or containerized React applications may experience cascading effects if the server process hangs, affecting scalability and availability of dependent services. The absence of known exploits provides a window for proactive mitigation, but the high severity score and ease of exploitation necessitate urgent attention.

Mitigation Recommendations

1. Monitor Meta's official channels for patches or updates addressing CVE-2025-67779 and apply them promptly once available. 2. Until patches are released, implement strict input validation and sanitization on all Server Function endpoints to reject malformed or suspicious payloads. 3. Employ rate limiting and request throttling on HTTP endpoints to reduce the risk of resource exhaustion from repeated malicious requests. 4. Use Web Application Firewalls (WAFs) with custom rules to detect and block anomalous deserialization payloads targeting React Server Components. 5. Isolate React Server Components in separate processes or containers with resource limits (CPU, memory) to contain potential DoS impact. 6. Conduct code audits and review deserialization logic to identify and harden unsafe deserialization patterns. 7. Implement robust monitoring and alerting for unusual server process hangs or high resource consumption indicative of exploitation attempts. 8. Educate development teams about secure deserialization practices and the risks of unsafe payload handling. 9. Consider temporary disabling or restricting access to Server Function endpoints if feasible until a fix is deployed. 10. Maintain an incident response plan to quickly address potential service disruptions caused by exploitation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Meta
Date Reserved
2025-12-11T22:58:08.827Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 693b579d8a7c12acf2c1d539

Added to database: 12/11/2025, 11:45:33 PM

Last enriched: 12/19/2025, 5:25:26 AM

Last updated: 2/7/2026, 12:15:59 PM

Views: 1097

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats