In early December 2025, the React core team disclosed two new vulnerabilities affecting React Server Components (RSC). These issues – Denial-of-Service and Source Code Exposure were found by security researchers probing the fixes for the previous week’s critical RSC vulnerability, known as “React2Shell”.
While these newly discovered bugs do not enable Remote Code Execution, meaning the React2Shell patch remained effective, they do open the door to two serious problems:
The React team identified these as a high-severity DoS (CVSS 7.5) and a medium-severity code leak (CVSS 5.3), with CVE identifiers CVE-2025-55184 / CVE-2025-67779 for the DoS and CVE-2025-55183 for the code exposure. Given the impact of these flaws, developers were urged to upgrade immediately to patched versions.
Security researchers found that a specially crafted HTTP request can make a React Server Components (RSC) endpoint enter an infinite loop. This causes the server (for example, Node.js) to spike to 100% CPU and become unresponsive.
An attacker doesn’t need custom server actions to exploit this; any app using RSC can be affected because a generic endpoint is exposed by default. The impact is a denial-of-service attack, preventing legitimate users from accessing the application.
The React team fixed the issue by updating RSC internals to stop the infinite loop during request deserialization, though the first patch was incomplete and required a follow-up fix.
The second issue is a bug that can leak server-side source code. By sending a specially crafted HTTP request to a vulnerable server action, an attacker can make React return the actual JavaScript source of that server function in the response.
This doesn’t affect every RSC endpoint. The function is only vulnerable if it returns data that includes a stringified argument (directly or indirectly). For example, if a server function takes user input (like a name) and returns a greeting string using that input, the bug could cause the entire function’s source code to be included in the response. This could even expose hardcoded secrets inside the function, such as API keys.
React fixed this by ensuring server responses never stringify or send function source code. The leak is limited in scope: only the code of the affected server function and inlined helpers can be exposed. Other files and environment-based secrets are not leaked.
In short, these issues could allow attackers to disrupt your service (DoS) or view parts of your server-side code, but they do not allow arbitrary code execution.
The React team provided a detailed timeline of the discovery, patching, and disclosure process for these vulnerabilities:
| Time | Highlights |
| December 3, 2025 | The source code leak issue was first reported to Vercel and to Meta’s bug bounty program by researcher Andrew MacPherson. This report indicated that React Server Components could inadvertently leak server-side code under certain conditions. |
| December 4, 2025 | The first denial-of-service vulnerability was reported through the Meta bug bounty program by a researcher known as RyotaK. This was the initial discovery of the DoS flaw. |
| December 6, 2025 | The React team confirmed both issues (the code leak and the DoS) and began in-depth investigation and work on fixes. |
| December 7, 2025 | Initial fixes were developed for the vulnerabilities. The React team started testing these fixes and planning the rollout of new patched releases. |
| December 8, 2025 | The team notified affected third parties, specifically, major hosting providers and maintainers of relevant open-source projects/frameworks – about the vulnerabilities, so they could prepare mitigations or coordinate releases. |
| December 10, 2025 | By this date, temporary mitigations were put in place by several hosting providers, and the React team had finished verifying the patches’ effectiveness. |
| December 11, 2025 (morning) | An additional DoS variant was reported to the Meta bug bounty program by Shinsaku Nomura, indicating there might be a remaining edge case not covered by the initial fix. |
| December 11, 2025 (early afternoon) | The React team officially published the patched versions of the affected packages and publicly disclosed the vulnerabilities. The DoS issue was disclosed under CVE-2025-55184, and the source leak issue under CVE-2025-55183. |
| December 11, 2025 (later on the same day) | Upon further internal testing, the team discovered a remaining DoS case that the earlier patch did not fully address. They immediately issued an additional fix for this and disclosed it as CVE-2025-67779 (a second DoS-related CVE for the incomplete fix). This final step ensured that all known exploit vectors for the DoS vulnerability were patched in the new releases. |
In summary, the DoS vulnerability could allow anyone to crash or stall your React server at will, resulting in downtime and loss of availability for users. Meanwhile, the source exposure flaw could let attackers scrape confidential server-side code, potentially leading to further exploits or leaks of secrets (for example, database credentials embedded in code). These issues were serious:
The React team released security patches on December 11, 2025 to fix the DoS and source code exposure vulnerabilities in React Server Components (RSC).
Join our weekly newsletter and stay updated
Any project using react-server-dom-* must be on 19.0.3, 19.1.4, 19.2.3, or later to be fully protected.
The React Server Components vulnerabilities disclosed on December 11, 2025 require immediate action. Developers should upgrade to the patched versions or update their framework to one that includes them to remove the DoS and source code exposure risks.
In addition, VAPT and automated VMDR tools can help identify such risks early. Regular VAPT can validate whether exposed RSC endpoints are exploitable, while an automated VMDR solution can continuously monitor dependencies, detect vulnerable package versions, and alert teams to known CVEs before they are abused.
The React team provided backported fixes across all React 19.x versions and coordinated with major frameworks, making safe upgrades straightforward. Applying these updates, combined with continuous vulnerability monitoring, protects your application from server outages and accidental leaks of server-side code or secrets.
The December 2025 React RSC vulnerabilities include a high-severity Denial-of-Service (DoS) flaw and a medium-severity server-side source code exposure issue. These bugs can allow attackers to crash React servers or leak server function code, but they do not enable remote code execution.
All React 19.x applications using React Server Components with versions 19.0.0 to 19.2.2 are affected. Popular frameworks like Next.js, React Router, Vite (RSC plugin), Parcel, and Waku were also impacted due to bundled RSC dependencies.
Developers should upgrade to patched versions: react-server-dom-* 19.0.3, 19.1.4, or 19.2.3 (or update their framework accordingly). Additionally, using VAPT and automated VMDR tools helps continuously detect vulnerable dependencies, exposed endpoints, and known CVEs before they are exploited.
The post Denial-of-Service and Source Code Exposure in React Server Components appeared first on Kratikal Blogs.
*** This is a Security Bloggers Network syndicated blog from Kratikal Blogs authored by Puja Saikia. Read the original post at: https://kratikal.com/blog/denial-of-service-and-source-code-exposure-in-react-server-components/