SB2025121219 - Multiple vulnerabilities in Facebook React
Published: December 12, 2025 Updated: January 16, 2026
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 3 secuirty vulnerabilities.
1) Deserialization of Untrusted Data (CVE-ID: CVE-2025-67779)
The vulnerability allows a remote attacker to perform a denial of service attack.
The vulnerability exists due to insecure input validation when processing serialized data. A remote attacker can send a specially crafted HTTP request, which can cause an infinite loop and prevent future HTTP requests from being served, leading to a denial of service condition.
The vulnerability affects the following components:
- react-server-dom-webpack (Meta)
- react-server-dom-turbopack (Meta)
- react-server-dom-parcel (Meta)
2) Deserialization of Untrusted Data (CVE-ID: CVE-2025-55184)
The vulnerability allows a remote attacker to perform a denial of service attack.
The vulnerability exists due to insecure input validation when processing serialized data. A remote attacker can send a specially crafted HTTP request, which can cause an infinite loop and prevent future HTTP requests from being served, leading to a denial of service condition.
The vulnerability affects the following components:
- react-server-dom-webpack (Meta)
- react-server-dom-turbopack (Meta)
- react-server-dom-parcel (Meta)
3) Information disclosure (CVE-ID: CVE-2025-55183)
The vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to the server may expose the source code of any server function when receiving a specially crafted HTTP request. A remote attacker can gain access to sensitive information.
The vulnerability affects the following components:
- react-server-dom-webpack (Meta)
- react-server-dom-turbopack (Meta)
- react-server-dom-parcel (Meta)
Successful exploitation requires the existence of a Server Function which explicitly or implicitly exposes a stringified argument.
Remediation
Install update from vendor's website.
References
- https://www.facebook.com/security/advisories/cve-2025-67779
- https://react.dev/blog/2025/12/11/denial-of-service-and-source-code-exposure-in-react-server-components
- https://www.facebook.com/security/advisories/cve-2025-55184
- https://github.com/facebook/react/security/advisories/GHSA-2m3v-v2m8-q956
- https://github.com/facebook/react/security/advisories/GHSA-7gmr-mq3h-m5h9
- https://www.facebook.com/security/advisories/cve-2025-55183
- https://github.com/facebook/react/security/advisories/GHSA-925w-6v3x-g4j4