Categories: Cyber Security News

PoC Exploit Released for Critical React, Next.js RCE Vulnerability (CVE-2025-55182)

A proof-of-concept (PoC) exploit for CVE-2025-55182, a maximum-severity remote code execution (RCE) flaw in React Server Components, surfaced publicly this week, heightening alarms for developers worldwide.

Dubbed “React2Shell” by some researchers, the vulnerability carries a CVSS score of 10.0 and affects React versions 19.0.0 through 19.2.0, as well as Next.js 15.x and 16.x using App Router. Even applications not explicitly implementing server functions remain exposed if they support React Server Components (RSC).​

Sponsored

Security researcher @maple3142 demonstrated the exploit via a Twitter post, showcasing a simple multipart HTTP request that injects a Node.js payload.

The demo triggers child process, popping open a Linux calculator on the target server without authentication.

An accompanying video captures a curl-like command exploiting the flaw through React’s Flight protocol, bypassing serialization safeguards with techniques like Blob references labeled “$B1337.” Framed as a CTF-style “JS jail” challenge, the shared gist drew praise from the community alongside questions on evasion methods.​

The root cause lies in insecure deserialization within the RSC Flight protocol, where malformed payloads pollute object prototypes and hijack server-side execution.

Discovered by Lachlan Davidson and responsibly disclosed to Meta and Vercel on November 29, the issue went public on December 3, prompting swift patches.

A new scanner tool was also introduced to identify vulnerable endpoints on the network for CVE-2025-55182.

Sponsored

Amazon threat intelligence reported exploitation attempts by China-nexus groups like Earth Lamia within hours of disclosure. Wiz Research estimates 39% of cloud environments host vulnerable instances, scanning over 968,000 servers.​

Palo Alto Networks Unit 42 and others confirmed the attack requires only a crafted POST request to RSC endpoints, achieving near-100% reliability in tests. React’s official advisory urges immediate upgrades, noting the flaw persists in default configurations of popular frameworks.​

Developers should audit deployments, apply patches from React 19.2.1+ and Next.js updates, and monitor for anomalies.

While no widespread breaches are confirmed yet, the PoC’s simplicity amplifies risks in production environments. This incident underscores the perils of server-side rendering in modern JavaScript stacks.​

Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

The post PoC Exploit Released for Critical React, Next.js RCE Vulnerability (CVE-2025-55182) appeared first on Cyber Security News.

rssfeeds-admin

Recent Posts

AliExpress Has a 500W 375Wh Adult Electric Bike for Just $270 with Free Delivery (Ships From the US)

Now is the time to retire that pedal-powered bike of yours and upgrade to electric.…

14 minutes ago

How the new iPhone 17E stacks up against Apple’s pricier phones

Unlike its predecessor, the iPhone 17E supports MagSafe. | Image: Apple The iPhone 17 lineup…

49 minutes ago

The Alienware Area-51 9800X3D RTX 5090 Gaming PC Drops to $4,550 (Lowest Price for 5090 Prebuilt)

If you're seeking chart-topping gaming performance, then Alienware's biggest and most powerful prebuilt desktop computer…

1 hour ago

God of War Series Casts 4 More Characters, Including Thor’s Children Modi, Magni, and Thrud

Fresh off releasing the first look at Ryan Hurst's Kratos, Prime Video has revealed four…

1 hour ago

Death toll for US service members in Iran war at 4 as Trump projects weeks of conflict

U.S. Secretary of Defense Pete Hegseth listens to questions during a news conference at the…

1 hour ago

Apple might use Google servers to store data for its upgraded AI Siri

Apple has asked Google to look into "setting up servers" for a new version of…

2 hours ago

This website uses cookies.