Cloudflare WAF proactively protects against React vulnerability
好的,我需要帮用户总结一篇文章的内容,控制在100字以内。首先,我要仔细阅读文章内容,抓住主要信息。 文章提到Cloudflare部署了新的保护措施,针对React Server Components(RSC)的一个漏洞。所有使用Cloudflare服务的客户都自动受到保护,无论免费还是付费用户,只要他们的React应用流量通过Cloudflare的Web应用防火墙(WAF)。Cloudflare Workers本身不受影响。 接下来,文章详细说明了漏洞的具体情况:这是一个远程代码执行(RCE)漏洞,影响Next.js、React Router和其他React框架。具体涉及React版本19.0到19.2,以及Next.js 15到16版本。Cloudflare已经部署了新的规则,默认阻止这些攻击,并且这些规则包含在免费和付费的规则集中。 文章还提到客户应该更新到最新的React和Next.js版本,并提供了规则ID和部署时间。此外,Cloudflare团队正在持续监控可能的攻击变种,并计划在未来几天内更新保护措施。 现在,我需要将这些信息浓缩到100字以内。重点包括:Cloudflare的新保护措施、受影响的应用、自动保护、更新建议以及持续监控。 确保语言简洁明了,不使用复杂的术语,直接传达关键点。 </think> Cloudflare推出新防护措施应对React Server Components漏洞,所有通过其WAF代理的应用自动受保护。建议用户更新至最新版本以增强安全性。 2025-12-3 00:0:0 Author: blog.cloudflare.com(查看原文) 阅读量:4 收藏

2025-12-03

1 min read

Cloudflare has deployed a new protection to address a vulnerability in React Server Components (RSC). All Cloudflare customers are automatically protected, including those on free and paid plans, as long as their React application traffic is proxied through the Cloudflare Web Application Firewall (WAF).

Cloudflare Workers are inherently immune to this exploit. React-based applications and frameworks deployed on Workers are not affected by this vulnerability.

What you need to know

Cloudflare has been alerted by its security partners to a Remote Code Execution (RCE) vulnerability impacting Next.js, React Router, and other React frameworks (security advisory CVE-2025-55182, rated CVSS 10.0). Specifically, React version 19.0, 19.1, and 19.2, and Next.js from version 15 through 16 were found to insecurely deserialize malicious requests, leading to RCE.

In response, Cloudflare has deployed new rules across its network, with the default action set to Block. These new protections are included in both the Cloudflare Free Managed Ruleset (available to all Free customers) and the standard Cloudflare Managed Ruleset (available to all paying customers). More information about the different rulesets can be found in our documentation.

The rule ID is as follows:

Ruleset

Rule ID

Default action

Managed Ruleset

33aa8a8a948b48b28d40450c5fb92fba

Block

Free Ruleset

2b5d06e34a814a889bee9a0699702280

Block

Customers on Professional, Business, or Enterprise plans should ensure that Managed Rules are enabled  —  follow these steps to turn it on. Customers on a Free plan have these rules enabled by default.

We recommend that customers update to the latest version of React 19.2.1 and the latest versions of Next.js (16.0.7, 15.5.7, 15.4.8).

The rules were deployed at 5:00 PM GMT on Tuesday, December 2, 2025. Since their release until the publication of this blog and the official CVE announcement, we have not observed any attempted exploit.

Looking forward

The Cloudflare security team has collaborated with partners to identify various attack patterns and ensure the new rules effectively prevent any bypasses. Over the coming hours and days, the team will maintain continuous monitoring for potential attack variations, updating our protections as necessary to secure all traffic proxied via Cloudflare.

BLOG-3089 2

Cloudflare's connectivity cloud protects entire corporate networks, helps customers build Internet-scale applications efficiently, accelerates any website or Internet application, wards off DDoS attacks, keeps hackers at bay, and can help you on your journey to Zero Trust.

Visit 1.1.1.1 from any device to get started with our free app that makes your Internet faster and safer.

To learn more about our mission to help build a better Internet, start here. If you're looking for a new career direction, check out our open positions.

Cloudforce OneWAFWeb Application FirewallVulnerabilitiesCVEReact

Related posts

November 24, 2025 2:00 PM

Get better visibility for the WAF with payload logging

The WAF provides ways for our customers to gain insight into why it takes certain actions. The more granular and precise the insight, the more reproducible and understandable it is. Revamped payload logging is one such method. ...

    By 

October 29, 2025 1:00 PM

One IP address, many users: detecting CGNAT to reduce collateral effects

IPv4 scarcity drives widespread use of Carrier-Grade Network Address Translation, a practice in ISPs and mobile networks that places many users behind each IP address, along with their collected activity and volumes of traffic. We introduce the method we’ve developed to detect large-scale IP sharing globally and mitigate the issues that result. ...

    By 

October 29, 2025 1:00 PM

Defending QUIC from acknowledgement-based DDoS attacks

We identified and patched two DDoS vulnerabilities in our QUIC implementation related to packet acknowledgements. Cloudflare customers were not affected. We examine the "Optimistic ACK" attack vector and our solution, which dynamically skips packet numbers to validate client behavior. ...

    By 

文章来源: https://blog.cloudflare.com/waf-rules-react-vulnerability/
如有侵权请联系:admin#unsafe.sh