如果你在用 React 19 / Next.js 15 / 16, 这篇就当是一个温柔但坚决的催命信: Vercel 已经出手,在它的全球 Web Application Firewall(WAF)上, 加了一层拦截规则,免费帮所有托管在上面的项目挡一波。
Critical RSC flaws in React and Next.js enable unauthenticated remote code execution; users should update to patched versions ...
React2Shell (CVE-2025-55182) is a critical vulnerability affecting the most widely used React-based services across the web ...
此漏洞被披露为 CVE-2025-55182,并被评为 CVSS 10.0。React Server Functions 允许客户端调用服务器上的函数,React 将客户端的请求转换为 HTTP 请求,并将这些请求转发到服务器。在服务器上,React 将 HTTP 请求转换为函数调用,并将所需数据返回给客户端。 未经身份验证的攻击者可以构造一个恶意的 HTTP 请求,发送到任何 Server ...
A maximum severity vulnerability, dubbed 'React2Shell', in the React Server Components (RSC) 'Flight' protocol allows remote code execution without authentication in React and Next.js applications.
Plane 1.2.0 rebuilt its frontend stack, migrating from Next.js to React Router and Vite, and fixed critical security ...
Critical vulnerability in React library should be treated by IT as they did Log4j - as an emergency, warns one expert.
Critical React vulnerability tracked as CVE-2025-55182 and React2Shell can be exploited for unauthenticated remote code ...
一些您可能无法访问的结果已被隐去。
显示无法访问的结果