Jan 2, 2026·6 min read·10 visits
CVSS 10.0 RCE in Next.js and React Server Components. Attackers can leverage the `constructor` property in the React Flight protocol to execute arbitrary code. Active in-the-wild exploitation confirmed.
A catastrophic Remote Code Execution (RCE) vulnerability in React Server Components (RSC) allows unauthenticated attackers to execute arbitrary JavaScript on the server via the React Flight protocol. Dubbed 'React2Shell', this issue stems from insecure deserialization and a build process failure.
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H| Product | Affected Versions | Fixed Version |
|---|---|---|
Next.js Vercel | >= 13.3.0, < 14.2.35 | 14.2.35 |
Next.js Vercel | 15.0.0 - 15.0.6 | 15.0.7 |
react-server-dom-webpack Meta | 19.0.0 | 19.0.1 |
| Attribute | Detail |
|---|---|
| CWE ID | CWE-502 (Deserialization of Untrusted Data) |
| CVSS Score | 10.0 (Critical) |
| Attack Vector | Network (Pre-Auth) |
| EPSS Score | 47.37% (High) |
| KEV Status | Listed (Active Exploitation) |
| Platform | Node.js / React |
The application deserializes untrusted data without sufficiently verifying that the resulting data will be valid, allowing the execution of arbitrary code.