F5 has released Web Application Firewall (WAF) signature updates to mitigate two newly disclosed critical vulnerabilities in React and Next.js:
- CVE-2025-55182
- CVE-2025-66478
- Severity: CVSS 10.0 (Critical)
Key Points
- Scope: Signatures are available across all F5 Application Delivery and Security Platform deployment methods:
- BIG-IP
- NGINX App Protect WAF
- F5 Distributed Cloud WAF
- Impact: F5 products themselves are not affected by these CVEs.
- Action required: Customers should update WAF signatures immediately to ensure protection against exploitation attempts.
How to Update Signatures
- BIG-IP Live Updates: F5 KB5072033 Live Updates Guide
- NGINX WAF: F5 NGINX WAF Signature Update
- Distributed Cloud: F5 Distributed Cloud WAF Update
Reference advisory: F5 Security Notice
Recommended Actions
- Apply the latest WAF signature updates across all deployment environments.
- Monitor logs for attempted exploitation of React/Next.js applications.
- Coordinate with application teams to patch React and Next.js dependencies to secure versions.
- Ensure layered defense: WAF signatures + runtime patching + dependency management.
Takeaway
These CVEs underscore the criticality of securing modern web frameworks like React and Next.js. . While F5 products are not directly vulnerable, updating WAF signatures is essential to block exploitation attempts in customer applications.
Leave a Reply