Skip to content

Commit 4be9f98

Browse files
Update Advisory-EGI-SVG-2025-26.md
1 parent 62036cb commit 4be9f98

File tree

1 file changed

+98
-4
lines changed

1 file changed

+98
-4
lines changed

2025/Advisory-EGI-SVG-2025-26.md

Lines changed: 98 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,105 @@
11
---
22
title: Advisory-EGI-SVG-2025-26
33
permalink: /Advisory-EGI-SVG-2025-26
4-
4+
redirect_from:
5+
- /Advisory-SVG-CVE-2025-55182
56
---
67

7-
**Advisory EGI-SVG-2025-26 is not public yet**
8+
## Advisory-EGI-SVG-2025-26
9+
10+
# CRITICAL risk React Server Components Vulnerability
11+
12+
Date: 2025-12-10
13+
Updated: 2026-01-13
14+
15+
16+
CRITICAL risk vulnerability concerning React Server Components
17+
allowing unauthenticated remote code execution.
18+
19+
## IDs AND CVSS SCORE
20+
21+
EGI SVG ID : EGI-SVG-2025-26
22+
23+
CVE ID : CVE-2025-55182
24+
25+
CVSS Score : 10.0 [R 1]
26+
27+
## AFFECTED SOFTWARE AND VERSIONS
28+
29+
See [R 2]
30+
31+
## ACTIONS REQUIRED/RECOMMENDED
32+
33+
Sites running web services depending on React Server Components
34+
should check [R 2] and have any vulnerable version updated urgently.
35+
36+
If anyone becomes aware of any situation where this vulnerability is
37+
exposed in the EGI infrastructure, then please inform EGI SVG.
38+
39+
40+
## MORE INFORMATION
41+
42+
An unauthenticated remote attacker could:
43+
44+
- Execute arbitrary code on the server
45+
46+
- Access or manipulate data processed by server-side React functions
47+
48+
- Compromise the hosting environment
49+
50+
- Potentially pivot deeper into infrastructure
51+
52+
Because this vulnerability requires no authentication and may be
53+
reachable through public endpoints, it is considered Critical.
54+
55+
The EGI SVG is currently not aware of potentially affected services
56+
providing functionality to the EGI ecosystem.
57+
58+
If EGI SVG becomes aware of any relevant exposure, we will send an
59+
update to this alert and require affected sites to patch within 7 days.
60+
61+
62+
## STATUS OF THIS ADVISORY
63+
64+
_TLP:CLEAR information - Unimited distribution_
65+
66+
https://advisories.egi.eu/Advisory-EGI-SVG-2025-26
67+
68+
https://advisories.egi.eu/Advisory-SVG-CVE-2025-55182
69+
70+
Minor updates may be made without re-distribution to the sites.
71+
72+
73+
## CONTACT AND OTHER INFORMATION ON SVG
74+
75+
-----------------------------
76+
This advisory is subject to the Creative Commons licence
77+
https://creativecommons.org/licenses/by/4.0/ and
78+
the EGI (https://www.egi.eu/) Software Vulnerability Group
79+
must be credited.
80+
-----------------------------
81+
82+
Comments or questions should be sent to
83+
svg-rat at mailman.egi.eu
84+
85+
Vulnerabilities relevant for EGI can be reported at
86+
report-vulnerability at egi.eu
87+
88+
(see [R 99] for further details, and other information on SVG)
89+
90+
91+
## REFERENCES
92+
93+
94+
- [R 1] <https://nvd.nist.gov/vuln/detail/CVE-2025-55182>
95+
96+
- [R 2] <https://react.dev/blog/2025/12/03/critical-security-vulnerability-in-react-server-components>
97+
98+
99+
- [R 98] <https://confluence.egi.eu/display/EGIBG/CSIRT+monitoring+for+exposure+to+%27CRITICAL%27+vulnerabilities>
100+
101+
- [R 99] <https://confluence.egi.eu/display/EGIBG/SVG+Advisories>
8102

9-
When it is it will be here.
103+
## CREDITS
10104

11-
You are looking in the right place
105+
SVG was alerted to this vulnerability by OSG

0 commit comments

Comments
 (0)