-
-
Notifications
You must be signed in to change notification settings - Fork 10.8k
fix: cve-2025-55182 critical rce vulnerability #14630
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
|
|
Hi @PierreCrb, Welcome, and thank you for contributing to React Router! Before we consider your pull request, we ask that you sign our Contributor License Agreement (CLA). We require this only once. You may review the CLA and sign it by adding your name to contributors.yml. Once the CLA is signed, the If you have already signed the CLA and received this response in error, or if you have any questions, please contact us at [email protected]. Thanks! - The Remix team |
|
AI slop patch |
ahahha i'm not IA bro sry |
|
Thanks, but these are all internal testing tools. Users of React Router should upgrade the appropriate plugins for their bundler and upgrade react/react-dom. This is all possible without us publishing a new version. |
|
@timdorr please clarify if you could, are you saying the react-router package is not vulnerable to CVE-2025-55182? https://react.dev/blog/2025/12/03/critical-security-vulnerability-in-react-server-components indicates this is and I would presume the solution would be to upgrade the library dependencies like react-server-dom-parcelto 19.0.1/19.1.2/19.2.1 which this pull request proposed upgrading it to 19.2.1. GHSA-fv66-9v8q-g76r |
|
The vulnerability doesn't come from this library (or next, waku, redwood, etc), but from the You'll note that the mitigation instructions for React Router on the React blog don't actually involve upgrading any of our packages: https://react.dev/blog/2025/12/03/critical-security-vulnerability-in-react-server-components#update-react-router |
🔒 Security Fix: Patch for CVE-2025-55182 (React Server Components RCE)
This PR updates the project's React dependencies to address CVE-2025-55182, a critical pre-authentication remote code execution vulnerability affecting React Server Components.
The vulnerability impacts React due to unsafe deserialization of payloads sent to Server Function endpoints.
Even projects that do not explicitly use Server Functions may still be exposed if they support React Server Components.
✔️ Changes
19.0.0→19.2.1These versions include the official security patch released by the React team on December 3, 2025.
✔️ Why this is important
The vulnerability is rated CVSS 10.0 (Critical) and allows an unauthenticated attacker to achieve remote code execution on servers using affected React packages.
Upgrading to the patched versions fully mitigates the issue.
Feel free to let me know if any adjustments or additional updates are needed.