Close Menu
Knowvenger | Your Daily Dose of TechKnowvenger | Your Daily Dose of Tech
  • Home
  • Cloud & DevOps
    • Networking & Security
    • AWS
  • Blockchain & Web3
    • Web3 Fundamentals
  • Web Development
    • HTTP & APIs
    • Frontend Development
What's Hot

Shared vs VPS vs Cloud Hosting | Which Is Best ?

January 15, 2026

Monolith Architecture

January 2, 2026

RAG | Retrieval Augmented Generation in Machine Learning

December 16, 2025
Facebook X (Twitter) Instagram
Knowvenger | Your Daily Dose of TechKnowvenger | Your Daily Dose of Tech
  • Home
  • Cloud & DevOps
    1. Networking & Security
    2. AWS
    3. View All

    Massive RSC Vulnerability Found in React 19 and Next.js | How to Protect Your App in 2025

    December 12, 2025

    Difference Between VPN and Proxy Server | Which One Should You Choose?

    November 2, 2025

    How to Create Your Own VPN on a Private Server

    October 26, 2025

    How to Reset MFA in AWS Cognito Hosted UI

    October 6, 2025

    Shared vs VPS vs Cloud Hosting | Which Is Best ?

    January 15, 2026

    Massive RSC Vulnerability Found in React 19 and Next.js | How to Protect Your App in 2025

    December 12, 2025

    Difference Between VPN and Proxy Server | Which One Should You Choose?

    November 2, 2025

    How to Create Your Own VPN on a Private Server

    October 26, 2025
  • Blockchain & Web3
    1. Web3 Fundamentals
    2. View All

    Web3 | How Decentralization Is Changing the Internet in 2025

    October 13, 2025

    Web3 | How Decentralization Is Changing the Internet in 2025

    October 13, 2025
  • Web Development
    1. HTTP & APIs
    2. Frontend Development
    3. View All

    Understanding CORS (Cross-Origin Resource Sharing)

    October 27, 2025

    Understanding HTTP Response Codes

    October 19, 2025

    What’s New in React 19

    November 26, 2025

    What is Zoneless Angular ?

    November 23, 2025

    What’s New in Angular 21 | 2025 Update

    November 22, 2025

    Angular subscribe() Function Explained

    October 18, 2025

    What’s New in React 19

    November 26, 2025

    What is Zoneless Angular ?

    November 23, 2025

    What’s New in Angular 21 | 2025 Update

    November 22, 2025

    Understanding CORS (Cross-Origin Resource Sharing)

    October 27, 2025
Knowvenger | Your Daily Dose of TechKnowvenger | Your Daily Dose of Tech
Home » Massive RSC Vulnerability Found in React 19 and Next.js | How to Protect Your App in 2025
Networking & Security

Massive RSC Vulnerability Found in React 19 and Next.js | How to Protect Your App in 2025

yasiru_jayashanBy yasiru_jayashanDecember 12, 2025Updated:January 15, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
react next js vulnerability
Share
Facebook Twitter LinkedIn Pinterest Email

A newly disclosed critical vulnerability in React Server Components (RSC) tracked as CVE-2025-55182 has put thousands of production applications at risk.
Because React Server Components execute on the server, any flaw in RSC has server-level consequences: remote code execution, data exposure, unauthorized access, and service hijacking.

Frameworks built on top of RSC, especially Next.js 15 and 16, are directly impacted through CVE-2025-66478, making this one of the most serious React ecosystem vulnerabilities in years.

If you are using React 19, Next.js 15–16, or any RSC-powered framework, it is critical to patch immediately.

But beyond just patching, our real-world experience cleaning an infected production server showed exactly how dangerous outdated systems can be.

Let’s break it down.

What Is the React Server Components Vulnerability (CVE-2025-55182)?

React Server Components allow React code to run on the server and stream UI updates to the client.
This gives developers a powerful server-side rendering and data-fetching layer, but it also creates an extended attack surface.

CVE-2025-55182 is a critical flaw in the RSC execution pipeline.

Security researchers found that attackers can manipulate:

  • Server Component serialization
  • Data hydration
  • Request boundaries
  • Component lifecycle behaviors

This could allow:

  • Remote code execution
  • Sensitive data exfiltration
  • Template injection
  • Server-side state manipulation

Next.js inherits this vulnerability through its RSC integration, tracked as CVE-2025-66478.

Impacted Versions and Required Updates

Next.js Affected Versions:

All versions between 15 and 16.

Patch Versions:

Update immediately to:

  • 15.0.5
  • 15.1.9
  • 15.2.6
  • 15.3.6
  • 15.4.8
  • 15.5.7
  • 16.0.7

React 19 Affected Versions:

All React 19 builds before patched releases.

React Patch Versions:

  • 19.0.1
  • 19.1.2
  • 19.2.1

If you use any RSC-dependent framework, upgrade React immediately.

If your Server Already Compromise ? (In Linux)

Essential Malware Investigation & Cleanup Commands

These commands were used during the actual infection recovery process. They can help you track down malicious processes, identify rogue systemd services, and detect auto-restarting malware.

Kill a Malicious Process by Name

If you detect an unknown process such as "fghgf":

pkill -f fghgf

This kills all running processes matching that name or command.

Watch File Creation in Real-Time (excellent for catching malware)

Malware often drops files into /tmp, /dev, or custom folders.

inotifywait -m /dev -e create

You can change /dev to /tmp or any directory you want to monitor.

Find Which Executable Created a Suspicious Device/File

If /dev/fghgf existed and you want to know which process owns it:

lsof /dev/fghgf

This reveals the PID, executable name, and process owner.

Find the Parent Process (PPID) to Identify How Malware Started

Replace the PID number (33458) with your suspicious PID:

ps -o pid,ppid,user,cmd -p 33458

If PPID = 1, the malware was started by systemd → check systemd services immediately.

Inspect systemd Services for Malware Startup Scripts

List services under sysinit:

ls -al /etc/systemd/system/sysinit.target.wants

Show all custom services:

ls -al /etc/systemd/system/*.service

Search all service files for ExecStart (common malware insertion point):

grep -R "ExecStart" -n /etc/systemd/system/*.service

Find Recently Modified Systemd Service Files

find /etc/systemd/system -type f -printf '%TY-%Tm-%Td %TH:%TM %p\n' | sort -r | head -n 30

This gives you the latest modified services, often the malware entry point.

Identify Which systemd Service Owns a Running Process

cat /proc/104125/cgroup

Stop the service immediately

This halts the running malicious process:

systemctl stop <service-name>

Disable the service so it does NOT start on boot

systemctl disable <service-name>

Delete the systemd service file

After stopping & disabling the service, remove the service definition:

rm -f /etc/systemd/system/<service-name>.service

Reload systemd to apply changes

systemctl daemon-reload
CVE-2025-55182 CVE-2025-66478 Hardening guide Malware cleanup React Server Components Vulnerability patching
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleWhat’s New in React 19
Next Article RAG | Retrieval Augmented Generation in Machine Learning
yasiru_jayashan
  • Website

Related Posts

Networking & Security

Difference Between VPN and Proxy Server | Which One Should You Choose?

November 2, 2025
Networking & Security

How to Create Your Own VPN on a Private Server

October 26, 2025
Add A Comment
Leave A Reply Cancel Reply

Top Posts

How to Reset MFA in AWS Cognito Hosted UI

October 6, 202571 Views

Angular subscribe() Function Explained

October 18, 202558 Views

What’s New in Angular 21 | 2025 Update

November 22, 202545 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Latest Reviews
Most Popular

How to Reset MFA in AWS Cognito Hosted UI

October 6, 202571 Views

Angular subscribe() Function Explained

October 18, 202558 Views

What’s New in Angular 21 | 2025 Update

November 22, 202545 Views
Our Picks

Shared vs VPS vs Cloud Hosting | Which Is Best ?

January 15, 2026

Monolith Architecture

January 2, 2026

RAG | Retrieval Augmented Generation in Machine Learning

December 16, 2025
© 2026 Knowvenger. All rights reserved.
  • Home
  • Cloud & DevOps
    1. Networking & Security
    2. AWS
    3. View All

    Massive RSC Vulnerability Found in React 19 and Next.js | How to Protect Your App in 2025

    December 12, 2025

    Difference Between VPN and Proxy Server | Which One Should You Choose?

    November 2, 2025

    How to Create Your Own VPN on a Private Server

    October 26, 2025

    How to Reset MFA in AWS Cognito Hosted UI

    October 6, 2025

    Shared vs VPS vs Cloud Hosting | Which Is Best ?

    January 15, 2026

    Massive RSC Vulnerability Found in React 19 and Next.js | How to Protect Your App in 2025

    December 12, 2025

    Difference Between VPN and Proxy Server | Which One Should You Choose?

    November 2, 2025

    How to Create Your Own VPN on a Private Server

    October 26, 2025
  • Blockchain & Web3
    1. Web3 Fundamentals
    2. View All

    Web3 | How Decentralization Is Changing the Internet in 2025

    October 13, 2025

    Web3 | How Decentralization Is Changing the Internet in 2025

    October 13, 2025
  • Web Development
    1. HTTP & APIs
    2. Frontend Development
    3. View All

    Understanding CORS (Cross-Origin Resource Sharing)

    October 27, 2025

    Understanding HTTP Response Codes

    October 19, 2025

    What’s New in React 19

    November 26, 2025

    What is Zoneless Angular ?

    November 23, 2025

    What’s New in Angular 21 | 2025 Update

    November 22, 2025

    Angular subscribe() Function Explained

    October 18, 2025

    What’s New in React 19

    November 26, 2025

    What is Zoneless Angular ?

    November 23, 2025

    What’s New in Angular 21 | 2025 Update

    November 22, 2025

    Understanding CORS (Cross-Origin Resource Sharing)

    October 27, 2025

Type above and press Enter to search. Press Esc to cancel.