• Link to Rss this site
  • Link to LinkedIn
  • Link to Youtube
  • Link to X
  • Link to Instagram
  • English English English en
  • Deutsch Deutsch German de
Sales: +49 5251 304-800 | Support: +49 5251 304-636
NoSpamProxy
  • PRODUCT
    • NoSpamProxy Cloud
    • NoSpamProxy Protection
    • NoSpamProxy Encryption
    • NoSpamProxy Large Files
    • NoSpamProxy Disclaimer
    • NoSpamProxy 25Reports
  • SOLUTIONS
    • M365 Mail Security
    • Managed Certificates
    • 32Guards
  • RESOURCES
    • Documentation
    • Forum
    • Webcast Training
    • Training Courses
    • Support
    • Software Download
  • PARTNERS
    • Finding Resellers
    • Becoming Reseller
    • Partner Portal
    • NFR Licenses
  • COMPANY
    • Contact
    • Testimonials
    • Team
    • Career
    • Events
    • Awards
  • PRICES
  • BLOG
    • Blog
    • Newsletter Subscription
  • FREE TRIAL VERSION
    • Price Request
    • Free Trial Version
  • English
    • Deutsch
  • Click to open the search input field Click to open the search input field Search
  • Menu Menu
  • Information

React vulnerability: NoSpamProxy is not affected

Experts are warning of a critical security vulnerability in React Server Components (RSC), which are part of the popular JavaScript framework React. This vulnerability allows attackers to remotely execute their own code on vulnerable servers. The well-known Next.js framework is also affected. There is no danger for NoSpamProxy customers.

12.12.2025|Last edited:12.12.2025

Which security vulnerability is involved?

The newly discovered security vulnerability CVE-2025-55182 in React Server Components affects not only React itself, but also popular frameworks such as Next.js. According to current analyses, around 39% of all cloud environments are potentially at risk.

With a CVSS score of 10, this security vulnerability has the highest possible severity rating. The Next.js team has assigned its own CVE identifier, CVE-2025-66478. However, this refers to the same problem.

What are the risks?

The vulnerability allows attackers to perform remote code execution (RCE) by injecting malicious code. Among others, the following are affected:

  • React Router
  • RedwoodSDK
  • Waku
  • @parcel/rsc
  • @vitejs/plugin-rsc

According to security researchers at Wiz and Aikido, the vulnerability is based on “insecure deserialization” in the React framework’s Flight protocol. It can be exploited by a specially crafted HTTP request that results in code execution on the server. The researchers were able to reproduce the attack in their own tests with a success rate of nearly 100 percent.

How can you protect yourself?

To minimize the risks of the current security vulnerability in React and Next.js, it is crucial to update all affected frameworks and libraries to the latest versions in order to close known vulnerabilities. In addition, it is advisable to carefully review and implement the official guidance from React developers and recommendations from security vendors such as Wiz and Aikido. To supplement this, system monitoring should be stepped up to detect suspicious activity early and ward off potential attacks. Taking these steps promptly will significantly reduce risk and ensure a secure application environment.

No risk for NoSpamProxy customers

Since Aurelia is used in the development of NoSpamProxy instead of the React JavaScript framework, there is no risk for NoSpamProxy customers.

Information about the components used in NoSpamProxy can be found in the respective SBOM (Software Bill of Materials), which has been delivered with NoSpamProxy since version 15.2. This means that NoSpamProxy meets an important criterion of the Cyber Resilience Act (CRA) prepared by the European Commission. This obliges manufacturers to provide SBOMs if their products contain digital elements and are sold in the EU.

    Not yet using NoSpamProxy?

    NoSpamProxy reliably protects your company from dangerous emails and offers many other security features. Request your free trial now!

    Get your free NoSpamProxy trial now!
    • share 
    • share 
    • share 
    • email 

    SEARCH

    PRODUCT

    • All Topics
    • NoSpamProxy Cloud
    • NoSpamProxy Protection
    • NoSpamProxy Encryption
    • NospamProxy Large Files

    You need support?

    You can find more information about NoSpamProxy in our documentation and forum.

    CATEGORY

    • All Topics
    • News
    • Product
    • Tech & Support
    • Events

    NoSpamProxy Newsletter

    Subscribe to Newsletter
    RSS Feed Logo RSS Feed Logo Subscribeto RSS Feed

    NoSpamProxy

    • NoSpamProxy Cloud
    • NoSpamProxy Encryption
    • NoSpamProxy Large Files
    • NoSpamProxy Disclaimer
    • Price request
    • Team
    • Career
    • General terms and conditions
    • Data Protection Information for Business Partners and Applicants
    • Cybersecurity (PSIRT)

    Partners

    • Becoming a reseller
    • Partners
    • Order Certificates
    • Newsletter

    Categories

    • All topics
    • News
    • Support
    • Updates
    • Order certificates

    Latest News

    • Gelöschter SPF-Eintrag: Warum DNS-Alarmierung unverzichtbar ist 800x800
      When the service provider deletes the SPF record: Why DNS alerts are essential16.01.2026 - 10:00
    • Link Wrapping als Angriffsvektor 800x800
      Link wrapping as an attack vector05.01.2026 - 10:02
    • Info Icon
      React vulnerability: NoSpamProxy is not affected12.12.2025 - 13:00
    IMPRINT • EULA • Privacy Policy • • © 2026 Net at Work GmbH
    • Link to Rss this site
    • Link to LinkedIn
    • Link to Youtube
    • Link to X
    • Link to Instagram
    Link to: AS4: Updating the root and intermediate certificates of the SmartMetering PKI Link to: AS4: Updating the root and intermediate certificates of the SmartMetering PKI AS4: Updating the root and intermediate certificates of the SmartMetering P...Info Icon Link to: Link wrapping as an attack vector Link to: Link wrapping as an attack vector Link Wrapping als Angriffsvektor 800x800Link wrapping as an attack vector
    Scroll to top Scroll to top Scroll to top