---
title: Protection from CVE-2025-55182 (React) and CVE-2025-66478 (Next.js)
summary: null
url: >-
  https://www.fastly.com/documentation/reference/changes/2025/12/added-virtual-patch-for-cve-2025-66478
---


A critical Remote Code Execution (RCE) vulnerability affecting both the React and Next.js frameworks has been assigned two CVEs: CVE-2025-55182 (React) and CVE-2025-66478 (Next.js). Fastly has created a single virtual patch labeled CVE-2025-66478 that addresses the vulnerabilities in both frameworks, and it is now available within your account. For more information, check out our [service advisory](https://www.fastlystatus.com/incident/378084).

To activate it and add protection to your services, follow the steps for your control panel below.

## Next-Gen WAF control panel

<!-- TabbedPanels component: 
<Panel id="tab-one" label="Professional or Premier platform">

1. <Partial name='step-ngwaf-login' inline />
1. <Partial name='step-ngwaf-select-site' inline />
1. From the **Rules** menu, select **Templated Rules**.
1. In the search bar, enter `CVE-2025-66478` and then click **View** for the CVE-2025-66478 templated rule.
1. Click **Configure** and then **Add trigger**.
1. Select the **Block requests from an IP immediately if the CVE-2025-66478 signal is observed** checkbox.
1. Click **Update rule**.

</Panel>
<Panel id="tab-two" label="Essential platform">

1. <Partial name='step-ngwaf-login' inline />
1. <Partial name='step-ngwaf-select-site' inline />
1. Click the **Signals** tab.
1. In the search bar, enter `CVE-2025-66478` and then click **View** for the CVE-2025-66478 tag.
1. Click the **Detections** tab and then **Add detection**.
1. Verify the switch is set to **Enabled**.
1. Click **Create detection**.
1. Click the **Alerts** tab and then **Add alert**.
1. In the **Status** area, set the switch to **Enabled**.
1. Click **Save alert**.

</Panel>
 -->

## Fastly control panel

1. <Partial name='step-login' inline />
1. <Partial name='step-ngwaf-click-workspaces' inline />
1. Click **Virtual Patches**.
1. In the search bar, enter `CVE-2025-66478` and then click the pencil to the right of the CVE-2025-66478 virtual patch.
1. From the **Status** menu, select **Enabled**.
1. *(Optional)* If your workspace is in blocking mode, choose whether to **Block requests** or **Log requests** if the CVE-2025-66478 signal is observed.
1. Click **Update virtual patch**.
