Intel

AIKIDO-2025-10867

react-server-dom-parcel is vulnerable to Remote Code Execution (RCE)

Remote Code Execution (RCE)CVE-2025-55182

100

Critical Risk

This Affects:

JSreact-server-dom-parcel
19.0.0 - 19.0.2
Fixed in 19.0.3
19.1.0 - 19.1.3
Fixed in 19.1.4
19.2.0 - 19.2.2
Fixed in 19.2.3

TL;DR

Affected versions of this package are vulnerable to unauthenticated remote code execution due to a flaw in how React Server Components decode payloads sent to Server Function endpoints. The issue can be exploited even if no Server Function endpoints are explicitly implemented. Attackers can craft malicious HTTP requests that lead to code execution on the server. Users of affected frameworks such as Next.js, react-router, waku, Parcel RSC, Vite RSC, and Turbopack should upgrade immediately.

Who does this affect?

You are affected if you are using a version that falls within the vulnerable range.

Background info

react-server-dom-parcel is vulnerable to Remote Code Execution (RCE) in versions 19.0.0 - 19.0.2, 19.1.0 - 19.1.3 and 19.2.0 - 19.2.2.

How to fix this

Upgrade the react-server-dom-parcel library to the patch version.