React Server Components Under Fire: New DoS & Source‑Code Exposure CVEs Explained (2026)

React's Security Nightmare: New Vulnerabilities Expose Secrets and Invite Attacks

React developers, brace yourselves! In a shocking revelation, new vulnerabilities in React Server Components have been discovered, adding to the existing woes. These bugs not only allow attackers to crash servers but also expose sensitive source code, creating a critical situation for those using React Server Components (RSC) and related frameworks.

The latest vulnerabilities, including two high-severity denial-of-service bugs (CVE-2025-55184 and CVE-2025-67779) and a source-code exposure flaw (CVE-2025-55183), were unearthed by security researchers while investigating the patch for a previously reported critical React flaw. But here's where it gets controversial—these researchers found that the patch itself had holes, leading to these new vulnerabilities.

The React server-side vulnerability, dubbed "React2Shell" (CVE-2025-55182), allows remote code execution and has already been exploited in the wild, with multiple intrusion clusters identified. But that's not all—the newly discovered denial-of-service bugs can be triggered by a malicious HTTP request, causing an infinite loop and potentially leaking server function source code.

The Impact:
These vulnerabilities pose a significant threat to React users. Attackers can disrupt services, access sensitive information, and potentially manipulate server environments. And this is the part most people miss—even the earlier patched versions of React2Shell are vulnerable to these new bugs, leaving many servers exposed.

Who's Affected:
React Server Components and frameworks that rely on the affected packages and versions are at risk. This includes react-server-dom-webpack, react-server-dom-parcel, and react-server-dom-turbopack, with specific vulnerable versions mentioned in the original article.

The Response:
The React team has acknowledged the issues and released security alerts, urging users to update their packages. However, the situation is dire, as many servers remain unpatched, and active exploitation is ongoing. Recent reports indicate that over 50 organizations have been impacted, with attackers from North Korea and China exploiting these vulnerabilities.

Controversial Comparison:
Some security experts have drawn parallels between React2Shell and the infamous Log4Shell vulnerability, which caused widespread chaos. Could React2Shell be the next Log4Shell? The debate is open, and the implications are concerning.

React's security saga continues, leaving developers and users on edge. As the community scrambles to patch these vulnerabilities, the question remains: How secure is our software, and what steps can we take to prevent such incidents in the future?

React Server Components Under Fire: New DoS & Source‑Code Exposure CVEs Explained (2026)
Top Articles
Latest Posts
Recommended Articles
Article information

Author: Rubie Ullrich

Last Updated:

Views: 6042

Rating: 4.1 / 5 (72 voted)

Reviews: 95% of readers found this page helpful

Author information

Name: Rubie Ullrich

Birthday: 1998-02-02

Address: 743 Stoltenberg Center, Genovevaville, NJ 59925-3119

Phone: +2202978377583

Job: Administration Engineer

Hobby: Surfing, Sailing, Listening to music, Web surfing, Kitesurfing, Geocaching, Backpacking

Introduction: My name is Rubie Ullrich, I am a enthusiastic, perfect, tender, vivacious, talented, famous, delightful person who loves writing and wants to share my knowledge and understanding with you.