Back to all posts

React2Shell: The 10.0 CVSS Nightmare in React Server Components

2026-01-03

The cybersecurity world was shaken on December 3, 2025, with the disclosure of CVE-2025-55182, ominously dubbed React2Shell.

With a maximum CVSS score of 10.0, this vulnerability allows unauthenticated remote code execution (RCE) on servers running vulnerable versions of React Server Components (RSC).

What is React2Shell?

React2Shell stems from an unsafe deserialization flaw in the React Flight protocol. When a server processes a malicious HTTP request targeting a Server Function endpoint, the flawed deserialization logic can be manipulated to execute arbitrary code.

Because this exploit requires no authentication and can be triggered remotely, it poses an existential threat to modern web applications built on the React ecosystem.

Who is Affected?

Use specific versions of the following packages are at risk:

  • React: Versions 19.0.0, 19.1.0, 19.1.1, 19.2.0
  • react-server-dom-webpack
  • react-server-dom-parcel
  • Next.js: Versions 15.x and 16.x (using App Router)

Immediate Mitigation

To protect your infrastructure, you must upgrade immediately:

npm install react@19.2.1 react-dom@19.2.1

If you are using Next.js, ensure you are on the latest patch release that addresses CVE-2025-66478.

Conclusion

React2Shell serves as a stark reminder that even the most modern and robust frameworks are not immune to critical flaws. If you are running RSCs in production, patch now.

Designed & Developed by Sonu

© 2026. All rights reserved.

Visitors #117

India,