如果你在用 React 19 / Next.js 15 / 16, 这篇就当是一个温柔但坚决的催命信: Vercel 已经出手,在它的全球 Web Application Firewall(WAF)上, 加了一层拦截规则,免费帮所有托管在上面的项目挡一波。
Critical RSC flaws in React and Next.js enable unauthenticated remote code execution; users should update to patched versions ...
Plane 1.2.0 rebuilt its frontend stack, migrating from Next.js to React Router and Vite, and fixed critical security ...
在一个瞬息万变的技术世界中,安全性无疑是开发者最为关心的话题之一。最近,Java界的明星框架React就因一个关键的安全漏洞而引发了广泛关注。12月4日,React官方发布了紧急公告,警告用户关于React Server Components中的一个高危漏洞:未经身份验证的远程代码执行(RCE)漏洞。
A maximum severity vulnerability, dubbed 'React2Shell', in the React Server Components (RSC) 'Flight' protocol allows remote code execution without authentication in React and Next.js applications.
React2Shell (CVE-2025-55182) is a critical vulnerability affecting the most widely used React-based services across the web ...
Critical React vulnerability tracked as CVE-2025-55182 and React2Shell can be exploited for unauthenticated remote code ...
Critical vulnerability in React library should be treated by IT as they did Log4j - as an emergency, warns one expert.