On December 3, 2025, the React Team disclosed a critical remote code execution (RCE) vulnerability affecting React Server Components, commonly used in modern Next.js deployments. An unauthenticated attacker could craft a malicious HTTP request that, when deserialized by React, results in remote code execution on the server. Additional technical details will be released once the upstream fix rollout is complete.
Learn more about what we know so far, the potential impact, and what security teams should be doing next in this Bugcrowd Security Flash with Trey Ford and Matt Held.
Don’t miss our updated security flash recorded on Dec 9 at 8pm ET. In this edition, Casey Ellis and Matt Held outline what we’ve learned about this vulnerability in the past week.
While this vulnerability is significant, it is not on the scale of Log4j. Early cloud telemetry suggests exposure in approximately one-third of monitored environments: serious, widespread, and urgent, but not internet-wide.
We’ll continue to update this blog as more information becomes available.
As soon as the vulnerability was disclosed, Bugcrowd Security initiated our zero-day response process. Here’s what we’ve done so far and what customers can expect from us:
We strongly recommend upgrading to these versions as soon as possible and validating any downstream packages in your dependency chain.
Bugcrowd treats zero-day events like this as moments when customers need clear, fast, and actionable visibility. That’s why we mobilized our global hacker community and internal response teams when this vulnerability was disclosed. We remain committed to providing every customer with the intelligence and support they need to stay ahead of evolving threats.
If you have any questions or require adjustments to how we process CVE-related submissions, please contact your Bugcrowd Customer Experience Manager.
Here are a few additional resources for more information: