CVE-2025-55182

critical

Description

A pre-authentication remote code execution vulnerability exists in React Server Components versions 19.0.0, 19.1.0, 19.1.1, and 19.2.0 including the following packages: react-server-dom-parcel, react-server-dom-turbopack, and react-server-dom-webpack. The vulnerable code unsafely deserializes payloads from HTTP requests to Server Function endpoints.

From the Tenable Blog

CVE-2025-55182: Frequently Asked Questions About React2Shell: React Server Components Remote Code Execution Vulnerability
CVE-2025-55182: Frequently Asked Questions About React2Shell: React Server Components Remote Code Execution Vulnerability

Published: 2025-12-04

React2Shell: A critical React flaw allowing unauthenticated RCE. Impacts include Next.js, React Router, and apps using Server Components.

References

https://www.infosecurity-magazine.com/news/rondodox-botnet-targets-hpe/

https://blog.checkpoint.com/research/patch-now-active-exploitation-underway-for-critical-hpe-oneview-vulnerability/

https://www.labs.greynoise.io/grimoire/2026-01-10-weekly-oast-report/

https://cyberscoop.com/vercel-cto-security-react2shell-vulnerability/

https://www.securityweek.com/rondodox-botnet-exploiting-react2shell-vulnerability/

https://www.databreachtoday.com/rondodox-botnet-exploiting-devices-react2shell-flaw-a-30436

https://thehackernews.com/2026/01/rondodox-botnet-exploits-critical.html

https://securityaffairs.com/186386/uncategorized/react2shell-under-attack-rondodox-botnet-spreads-miners-and-malware.html

https://www.bleepingcomputer.com/news/security/rondodox-botnet-exploits-react2shell-flaw-to-breach-nextjs-servers/

https://www.helpnetsecurity.com/2025/12/18/miggo-research-waf-vulnerability-bypass/

https://www.bleepingcomputer.com/news/security/critical-react2shell-flaw-exploited-in-ransomware-attacks/

https://thehackernews.com/2025/12/react2shell-vulnerability-actively.html

https://www.securityweek.com/google-sees-5-chinese-groups-exploiting-react2shell-for-malware-delivery/

https://isc.sans.edu/diary/rss/32572

https://www.theregister.com/2025/12/12/vulnerable_react_instances_unpatched/

https://www.theregister.com/2025/12/12/new_react_secretleak_bugs/

https://www.darkreading.com/threat-intelligence/react2shell-exploits-flood-internet-attacks-continue

https://thehackernews.com/2025/12/new-react-rsc-vulnerabilities-enable.html

https://www.securityweek.com/wide-range-of-malware-delivered-in-react2shell-attacks/

https://securelist.com/cve-2025-55182-exploitation/118331/

https://securityaffairs.com/185538/apt/new-etherrat-backdoor-surfaces-in-react2shell-attacks-tied-to-north-korea.html

https://www.securityweek.com/react2shell-attacks-linked-to-north-korean-hackers/

https://www.infosecurity-magazine.com/news/react2shell-exploit-campaigns/

https://www.huntress.com/blog/peerblight-linux-backdoor-exploits-react2shell

https://www.bleepingcomputer.com/news/security/north-korean-hackers-exploit-react2shell-flaw-in-etherrat-malware-attacks/

https://www.bitdefender.com/en-us/blog/labs/cve-2025-55182-exploitation-hits-the-smart-home

https://thehackernews.com/2025/12/north-korea-linked-actors-exploit.html

https://therecord.media/researchers-track-dozens-react2shell-vuln

https://securityaffairs.com/185427/security/u-s-cisa-adds-a-meta-react-server-components-flaw-to-its-known-exploited-vulnerabilities-catalog.html

https://www.theregister.com/2025/12/05/aws_beijing_react_bug/

https://www.securityweek.com/cloudflare-outage-caused-by-react2shell-mitigations/

https://www.darkreading.com/vulnerabilities-threats/react2shell-under-attack-china-nexus-groups

https://www.cisa.gov/news-events/alerts/2025/12/05/cisa-adds-one-known-exploited-vulnerability-catalog

https://therecord.media/chinese-hackers-exploiting-react2shell-vulnerability-amazon

https://thehackernews.com/2025/12/chinese-hackers-have-started-exploiting.html

Details

Source: Mitre, NVD

Published: 2025-12-03

Updated: 2025-12-06

Named Vulnerability: React2ShellKnown Exploited Vulnerability (KEV)

Risk Information

CVSS v2

Base Score: 10

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Severity: Critical

CVSS v3

Base Score: 10

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

Severity: Critical

EPSS

EPSS: 0.5512

Vulnerability Watch

Tenable Research has classified this CVE under the following Vulnerability Watch classification, which includes active and historical (inactive) classifications. You can learn more about these classifications on our blog.

Vulnerability of Interest