发现两个新的RSC协议漏洞
Two new RSC protocol vulnerabilities uncovered

原始链接: https://nextjs.org/blog/security-update-2025-12-11

## Next.js 安全公告:React 服务器组件漏洞 React 服务器组件 (RSC) 协议中发现了两个新的漏洞 (CVE-2025-55183 & CVE-2025-55184),影响使用 App Router 的 Next.js 应用程序。这些漏洞是在与 React2Shell 补丁相关的安全研究中发现的,但**不会导致远程代码执行**,并且 React2Shell 补丁仍然有效。 CVE-2025-55184 是一个**高危拒绝服务**漏洞,一个精心构造的 HTTP 请求可能导致无限循环,从而使服务器崩溃。CVE-2025-55183 是一个**中危源代码泄露**漏洞,如果服务器函数中硬编码了敏感信息,则可能泄露应用程序逻辑或密钥。 **使用 RSC 和 App Router 的受影响应用程序必须升级。** Pages Router 不受影响,但仍建议升级。 针对 Next.js 13.3 及更高版本的特定修复程序可用 – 请参阅公告,以确定基于您当前发布版本线升级到哪个版本(范围从 14.2.34 到 16.1.0-canary.17)。**没有解决方法;必须升级。** 有关完整详细信息,请参阅官方 React 博客文章。

黑客新闻 新 | 过去 | 评论 | 提问 | 展示 | 招聘 | 提交 登录 发现两个新的 RSC 协议漏洞 (nextjs.org) 15 分,0xedb 54 分钟前 | 隐藏 | 过去 | 收藏 | 1 条评论 ChrisArchitect 52 分钟前 [–] 相关:React 服务器组件中的拒绝服务和源代码泄露 https://news.ycombinator.com/item?id=46236924 回复 指南 | 常见问题 | 列表 | API | 安全 | 法律 | 申请 YC | 联系 搜索:
相关文章

原文

Note: Some patched versions are still being released to npm. If a version listed below is not yet available, please check back shortly.

Two additional vulnerabilities have been identified in the React Server Components (RSC) protocol. These issues were discovered while security researchers examined the patches for React2Shell. Importantly, neither of these new issues allow for Remote Code Execution. The patch for React2Shell remains fully effective.

These vulnerabilities originate in the upstream React implementation (CVE-2025-55183, CVE-2025-55184). This advisory tracks the downstream impact on Next.js applications using the App Router. For full details, see the React blog post.

Impact

Denial of Service: CVE-2025-55184 (High Severity)

A specifically crafted HTTP request can be sent to any App Router endpoint that, when deserialized, can cause an infinite loop that hangs the server process and prevents future HTTP requests from being served.

Source Code Exposure: CVE-2025-55183 (Medium Severity)

A specifically crafted HTTP request can cause a Server Function to return the compiled source code of other Server Functions in your application. This could reveal business logic. Secrets could also be exposed if they are defined directly in your code (rather than accessed via environment variables at runtime) and referenced within a Server Function. Depending on your bundler configuration, these values may be inlined into the compiled function output.

Affected and Fixed Next.js Versions

Applications using React Server Components with the App Router are affected. The table below shows which versions are affected by each vulnerability and the corresponding fix:

VersionDoS (CVE-2025-55184)Source Code Exposure (CVE-2025-55183)Fixed In
>=13.3Upgrade to 14.2.34
14.x14.2.34
15.0.x15.0.6
15.1.x15.1.10
15.2.x15.2.7
15.3.x15.3.7
15.4.x15.4.9
15.5.x15.5.8
15.x canary15.6.0-canary.59
16.0.x16.0.9
16.x canary16.1.0-canary.17

Pages Router applications are not affected, but we still recommend upgrading to a patched version.

Required Action

All users should upgrade to the latest patched version in their release line:

If you are on Next.js >=13.3, 14.0.x, or 14.1.x, upgrade to the latest 14.2.x release.

npm install [email protected]  # for 14.x
npm install [email protected]   # for 15.0.x
npm install [email protected]  # for 15.1.x
npm install [email protected]   # for 15.2.x
npm install [email protected]   # for 15.3.x
npm install [email protected]   # for 15.4.x
npm install [email protected]   # for 15.5.x
npm install [email protected]   # for 16.0.x
 
npm install [email protected]   # for 15.x canary releases
npm install [email protected]   # for 16.x canary releases

There is no workaround. Upgrading to a patched version is required.

Resources

Discovery

Thank you to RyotaK from GMO Flatt Security Inc. and Andrew MacPherson for discovering and responsibly disclosing these vulnerabilities. We are intentionally limiting technical detail in this advisory to protect developers who have not yet upgraded.

联系我们 contact @ memedata.com