Views:
Versions of RSC that are reported to be affected include versions 19.0 through 19.2.0
 
React has released fixes for the issues in versions 19.0.1, 19.1.2 and 19.2.1 and customers using any of the affected versions are advised to upgrade immediately to one of the unaffected versions due to the critical nature of this vulnerability.
 
 

Trend Micro Protection & Detection Against Exploitation

First and foremost, it is always recommended that users apply vendor-specific patches when they are available. As mentioned above, RSC users with affected components should upgrade as soon as possible.

Trend Vision Oneā„¢ 

Trend Micro has added Time-Critical Vulnerability alert in the Trend Vision One Executive Dashboard that will be continually updated with additional information related to prevention and detection as it becomes available.

 
 

In addition to the vendor patch(s) that should be applied, Trend Micro has released some detection rules and filters that may help provide additional protection and detection of malicious assets associated with this vulnerability. 

Trend Vision One - Endpoint Security and Deep Security IPS Rules

  • 1012497 - React Server Remote Code Execution Vulnerability (CVE-2025-55182 and CVE-2025-66478) - 1
  • 1012494 - React Server Remote Code Execution Vulnerability (CVE-2025-55182 and CVE-2025-66478) - 2

Trend Cloud One - Network Security & TippingPoint Digital Vaccine (DV) Filters

  • 46746: HTTP: React Server Components Code Execution Vulnerability
  • 42590: HTTP: Suspicious HTTP Request Containing NodeJS Command Execution

Trend Micro Deep Discovery Inspector (DDI) Rules

  • 5595: CVE-2025-55182 - RSC NEXTJS RCE Exploit - HTTP(Request)

Trend Research will continue to monitor and update this threat as more information becomes available.