CVEReports
CVEReports

Automated vulnerability intelligence platform. Comprehensive reports for high-severity CVEs generated by AI.

Product

  • Home
  • Sitemap
  • RSS Feed

Company

  • About
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CVEReports. All rights reserved.

Made with love by Amit Schendel & Alon Barad



CVE-2025-55182
10.047.37%

React2Shell: When Server Components Serve Shells

Alon Barad
Alon Barad
Software Engineer

Jan 2, 2026·6 min read·10 visits

Active ExploitationCISA KEV Listed

Executive Summary (TL;DR)

CVSS 10.0 RCE in Next.js and React Server Components. Attackers can leverage the `constructor` property in the React Flight protocol to execute arbitrary code. Active in-the-wild exploitation confirmed.

A catastrophic Remote Code Execution (RCE) vulnerability in React Server Components (RSC) allows unauthenticated attackers to execute arbitrary JavaScript on the server via the React Flight protocol. Dubbed 'React2Shell', this issue stems from insecure deserialization and a build process failure.

Official Patches

ReactOfficial React Advisory
Next.jsNext.js Security Update

Fix Analysis (1)

Technical Appendix

CVSS Score
10.0/ 10
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
EPSS Probability
47.37%
Top 4% most exploited
50,000
Estimated exposed hosts via Shodan

Affected Systems

Next.js (Versions 13.3.0 - 15.0.x)React Server Components (RSC) RuntimesWaku FrameworkParcel RSCVite RSC Plugin

Affected Versions Detail

Product
Affected Versions
Fixed Version
Next.js
Vercel
>= 13.3.0, < 14.2.3514.2.35
Next.js
Vercel
15.0.0 - 15.0.615.0.7
react-server-dom-webpack
Meta
19.0.019.0.1
AttributeDetail
CWE IDCWE-502 (Deserialization of Untrusted Data)
CVSS Score10.0 (Critical)
Attack VectorNetwork (Pre-Auth)
EPSS Score47.37% (High)
KEV StatusListed (Active Exploitation)
PlatformNode.js / React

MITRE ATT&CK Mapping

T1190Exploit Public-Facing Application
Initial Access
T1059.007Command and Scripting Interpreter: JavaScript
Execution
T1203Exploitation for Client Execution
Execution
CWE-502
Deserialization of Untrusted Data

The application deserializes untrusted data without sufficiently verifying that the resulting data will be valid, allowing the execution of arbitrary code.

Known Exploits & Detection

GitHubProof of concept for React2Shell exploitation
AssetnoteScanner to identify vulnerable React Server Component endpoints
NucleiDetection Template Available

Vulnerability Timeline

Vendor releases security advisories and patches
2025-12-03
Exploit PoCs begin appearing on GitHub
2025-12-04
Added to CISA Known Exploited Vulnerabilities (KEV) Catalog
2025-12-05
Active exploitation by China-nexus groups reported
2025-12-06

References & Sources

  • [1]AWS Security Blog: China-Nexus Exploitation
  • [2]CISA KEV Entry
Related Vulnerabilities
CVE-2025-66478

Attack Flow Diagram

Press enter or space to select a node. You can then use the arrow keys to move the node around. Press delete to remove it and escape to cancel.
Press enter or space to select an edge. You can then press delete to remove it or escape to cancel.