Vulnerability background:
Vulnerable versions: React 19.0, 19.1.0, 19.1.1, and 19.2.0
Patched in React 19.2.1
Next.js is a web development framework that depends on React, and is also commonly used for building user interfaces. (The Next.js vulnerability was referenced as CVE-2025-66478 before being marked as a duplicate.)
Vulnerable versions: Next.js 15.x, Next.js 16.x, Next.js 14.3.0-canary.77 and later canary releases
Patched versions are listed here.
Announcement: https://nextjs.org/blog/CVE-2025-66478
Mitigate CVE-2025-55182 and CVE-2025-66478 using Avi Web Application Firewall (WAF)
SecRule REQUEST_HEADERS:Next-Action|REQUEST_HEADERS:rsc-action-id "@unconditionalMatch" \
"id:4099870,\
phase:1,\
pass,\
nolog,\
t:none,\
setvar:tx.is_react_action=1,\
ctl:RequestBodyAccess=On"
6.3.2 Rule2: If the request is a React action, inspect the request body/arguments for dangerous keywords. If found → block the request.
SecRule TX:is_react_action "@eq 1" \
"id:4099871,\
phase:2,\
block,\
msg:'React CVE-2025-55182 Exploit Attempt',\
severity:CRITICAL,\
chain"
SecRule ARGS|REQUEST_BODY "@rx \b(?:__proto__|constructor|prototype|child_process|vm|fs)\b" \
"t:none, t:urlDecodeUni, t:lowercase"