|
1 | 1 | --- |
2 | 2 | title: Advisory-EGI-SVG-2025-26 |
3 | 3 | permalink: /Advisory-EGI-SVG-2025-26 |
4 | | - |
| 4 | +redirect_from: |
| 5 | + - /Advisory-SVG-CVE-2025-55182 |
5 | 6 | --- |
6 | 7 |
|
7 | | -**Advisory EGI-SVG-2025-26 is not public yet** |
| 8 | +## Advisory-EGI-SVG-2025-26 |
| 9 | + |
| 10 | +# CRITICAL risk React Server Components Vulnerability |
| 11 | + |
| 12 | +Date: 2025-12-10 |
| 13 | +Updated: 2026-01-13 |
| 14 | + |
| 15 | + |
| 16 | +CRITICAL risk vulnerability concerning React Server Components |
| 17 | +allowing unauthenticated remote code execution. |
| 18 | + |
| 19 | +## IDs AND CVSS SCORE |
| 20 | + |
| 21 | +EGI SVG ID : EGI-SVG-2025-26 |
| 22 | + |
| 23 | +CVE ID : CVE-2025-55182 |
| 24 | + |
| 25 | +CVSS Score : 10.0 [R 1] |
| 26 | + |
| 27 | +## AFFECTED SOFTWARE AND VERSIONS |
| 28 | + |
| 29 | +See [R 2] |
| 30 | + |
| 31 | +## ACTIONS REQUIRED/RECOMMENDED |
| 32 | + |
| 33 | +Sites running web services depending on React Server Components |
| 34 | +should check [R 2] and have any vulnerable version updated urgently. |
| 35 | + |
| 36 | +If anyone becomes aware of any situation where this vulnerability is |
| 37 | +exposed in the EGI infrastructure, then please inform EGI SVG. |
| 38 | + |
| 39 | + |
| 40 | +## MORE INFORMATION |
| 41 | + |
| 42 | +An unauthenticated remote attacker could: |
| 43 | + |
| 44 | +- Execute arbitrary code on the server |
| 45 | + |
| 46 | +- Access or manipulate data processed by server-side React functions |
| 47 | + |
| 48 | +- Compromise the hosting environment |
| 49 | + |
| 50 | +- Potentially pivot deeper into infrastructure |
| 51 | + |
| 52 | +Because this vulnerability requires no authentication and may be |
| 53 | +reachable through public endpoints, it is considered Critical. |
| 54 | + |
| 55 | +The EGI SVG is currently not aware of potentially affected services |
| 56 | +providing functionality to the EGI ecosystem. |
| 57 | + |
| 58 | +If EGI SVG becomes aware of any relevant exposure, we will send an |
| 59 | +update to this alert and require affected sites to patch within 7 days. |
| 60 | + |
| 61 | + |
| 62 | +## STATUS OF THIS ADVISORY |
| 63 | + |
| 64 | +_TLP:CLEAR information - Unimited distribution_ |
| 65 | + |
| 66 | +https://advisories.egi.eu/Advisory-EGI-SVG-2025-26 |
| 67 | + |
| 68 | +https://advisories.egi.eu/Advisory-SVG-CVE-2025-55182 |
| 69 | + |
| 70 | +Minor updates may be made without re-distribution to the sites. |
| 71 | + |
| 72 | + |
| 73 | +## CONTACT AND OTHER INFORMATION ON SVG |
| 74 | + |
| 75 | +----------------------------- |
| 76 | + This advisory is subject to the Creative Commons licence |
| 77 | + https://creativecommons.org/licenses/by/4.0/ and |
| 78 | + the EGI (https://www.egi.eu/) Software Vulnerability Group |
| 79 | + must be credited. |
| 80 | +----------------------------- |
| 81 | + |
| 82 | +Comments or questions should be sent to |
| 83 | + svg-rat at mailman.egi.eu |
| 84 | + |
| 85 | +Vulnerabilities relevant for EGI can be reported at |
| 86 | + report-vulnerability at egi.eu |
| 87 | + |
| 88 | +(see [R 99] for further details, and other information on SVG) |
| 89 | + |
| 90 | + |
| 91 | +## REFERENCES |
| 92 | + |
| 93 | + |
| 94 | +- [R 1] <https://nvd.nist.gov/vuln/detail/CVE-2025-55182> |
| 95 | + |
| 96 | +- [R 2] <https://react.dev/blog/2025/12/03/critical-security-vulnerability-in-react-server-components> |
| 97 | + |
| 98 | + |
| 99 | +- [R 98] <https://confluence.egi.eu/display/EGIBG/CSIRT+monitoring+for+exposure+to+%27CRITICAL%27+vulnerabilities> |
| 100 | + |
| 101 | +- [R 99] <https://confluence.egi.eu/display/EGIBG/SVG+Advisories> |
8 | 102 |
|
9 | | -When it is it will be here. |
| 103 | +## CREDITS |
10 | 104 |
|
11 | | -You are looking in the right place |
| 105 | +SVG was alerted to this vulnerability by OSG |
0 commit comments