Recently, the core React team at Meta and the Next.js team at Vercel jointly announced two Critical security vulnerabilities: CVE-2025-55182 (React) and CVE-2025-66478 (Next.js). Both vulnerabilities have a maximum CVSS score of 10. Under certain conditions, an attacker can exploit them to execute arbitrary code. Furthermore, Alibaba Cloud Security has observed that well-known hacking tools have released modules leveraging this vulnerability.
Frameworks like React and Next.js are top choices for many developers, with millions of websites and applications built on them. Attackers can exploit these vulnerabilities to compromise servers, which could lead to irreversible business losses. Therefore, Alibaba Cloud Security strongly advises all affected customers to remediate these vulnerabilities immediately.
Vulnerability Details
React Server Components (RSC), a new component type introduced in React 19, are widely used for rendering services in frameworks like Next.js. The vulnerability, CVE-2025-55182, arises from a lack of validation when parsing client-submitted forms. This allows an attacker to craft a malicious request, invoke internal modules, and ultimately achieve unauthorized code execution. Since Next.js versions like 15.x and 16.x use the affected React component package, they are also vulnerable. The corresponding CVE for Next.js is CVE-2025-66478.
Scope of Impact
For the React component, the affected versions are as follows:
react-server-dom-parcel 19.0, 19.1.0, 19.1.1, 19.2.0
react-server-dom-turbopack 19.0, 19.1.0, 19.1.1, 19.2.0
react-server-dom-webpack 19.0, 19.1.0, 19.1.1, 19.2.0
For Next.js, the affected versions are as follows:
14.3.0-canary.77 <= Next < 15.0.5
15.1.0 <= Next < 15.1.9
15.2.0 <= Next < 15.2.6
15.3.0 <= Next < 15.3.6
15.4.0 <= Next < 15.4.8
15.5.0 <= Next < 15.5.7
16.0.0 <= Next < 16.0.7
Three-Layer Coordinated Defense
In response to CVE-2025-55182 and CVE-2025-66478, Alibaba Cloud has acted swiftly to update the rules across its security products. This enables a comprehensive defense that includes vulnerability scanning at the host layer, as well as protection and blocking at the application and network layers. Alibaba Cloud Security advises users of the React and Next.js frameworks to take immediate security measures to mitigate these vulnerabilities.
Once customers enable Security Center, they can use "Vulnerabilities - Application Vulnerability" or "Host Protection -Agentless Detection" to scan their ECS hosts for this vulnerability. The agentless detection feature supports security risk assessments for ECS instances without needing to install a client, and has a negligible impact on server performance.
Customers can also use the Container Image Scan feature to scan their container images for this vulnerability. Container Image Scan offers comprehensive security detection and management capabilities, helping you quickly identify high-risk system vulnerabilities, application vulnerabilities, malicious samples, and configuration risks in your images.
If this vulnerability is detected, we recommend using Web Application Firewall and Cloud Firewall to block attacks, while also upgrading your application components as soon as possible.
You can follow these steps for detection and defense:
Alibaba Cloud Web Application Firewall (WAF) has published protection rules for vulnerabilities CVE-2025-55182 and CVE-2025-66478. If you have auto-update enabled for the core web protection rule detection engine, WAF will protect you against these vulnerabilities by default.
If you have not enabled auto-update, you can follow these steps to enable detection and defense:

Cloud Firewall has published protection rules for vulnerabilities CVE-2025-55182 and CVE-2025-66478. If your protection engine is set to Block Mode, Cloud Firewall will automatically block these threats by default.
You can follow these steps to set up detection and defense:
For customers who have purchased Alibaba Cloud's Managed Security Service (MSS), we offer the following support:
● Asset Identification: Automatically discover application assets that use affected versions of React or Next.js.
● Remediation Guidance: Provide prompt and precise upgrade recommendations and temporary mitigation measures, such as custom WAF rules.
● Proactive Defense: Integrate with WAF and Cloud Firewall to automatically deploy virtual patches and block attacks in real-time.
● Continuous Monitoring: Provide 7*24 security monitoring to promptly detect and assess potential threats.
● Emergency Response: Quickly intervene in security incidents, assisting with root cause analysis and immediate remediation.
● Post-Incident Hardening: Deliver a risk assessment report to help you improve your overall cloud security posture.
1. Remediation: Check your applications to see if they use affected React components or related frameworks (such as Next.js). If they do, we strongly recommend upgrading to a secure version. For example, Next.js users should run the appropriate upgrade command for their current version.
npm install next@15.0.5 # for 15.0.x
npm install next@15.1.9 # for 15.1.x
npm install next@15.2.6 # for 15.2.x
npm install next@15.3.6 # for 15.3.x
npm install next@15.4.8 # for 15.4.x
npm install next@15.5.7 # for 15.5.x
npm install next@16.0.7 # for 16.0.x
If you are using a canary version of Next.js, such as 14.3.0-canary.77 or later, we recommend downgrading to the stable Next.js 14 version.
npm install next@14
Users of other frameworks can refer to https://react.dev/blog/2025/12/03/critical-security-vulnerability-in-react-server-components for instructions on scanning and upgrading.
2. Mitigation: Use security products like WAF and Cloud Firewall to block related scans and attacks. (Note: This is only a mitigation measure. To fully resolve the vulnerability, please follow the remediation plan and upgrade your systems.)
Alibaba Cloud Supports The Hong Kong Cybersecurity Drill-Offensive For Defensive 2025
4 posts | 0 followers
FollowAlibaba Clouder - January 19, 2018
VikashThakur - December 24, 2024
Apache Flink Community - August 1, 2025
Alibaba Clouder - September 21, 2020
Alibaba Clouder - March 29, 2019
Alibaba Cloud Security - January 13, 2019
4 posts | 0 followers
Follow
WAF(Web Application Firewall)
A cloud firewall service utilizing big data capabilities to protect against web-based attacks
Learn More
Web Hosting Solution
Explore Web Hosting solutions that can power your personal website or empower your online business.
Learn More
Security Center
A unified security management system that identifies, analyzes, and notifies you of security threats in real time
Learn More
Security Solution
Alibaba Cloud is committed to safeguarding the cloud security for every business.
Learn More