CVE-2025-55182

Published Dec 3, 2025

Last updated 3 months ago

Exploit knownCVSS critical 10.0
React
react2shell
npm
Cloud
Business logic

Overview

Description
A pre-authentication remote code execution vulnerability exists in React Server Components versions 19.0.0, 19.1.0, 19.1.1, and 19.2.0 including the following packages: react-server-dom-parcel, react-server-dom-turbopack, and react-server-dom-webpack. The vulnerable code unsafely deserializes payloads from HTTP requests to Server Function endpoints.
Source
cve-assign@fb.com
NVD status
Analyzed
Products
react, next.js

Risk scores

CVSS 3.1

Type
Secondary
Base score
10
Impact score
6
Exploitability score
3.9
Vector string
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Severity
CRITICAL

Known exploits

Data from CISA

Vulnerability name
Meta React Server Components Remote Code Execution Vulnerability
Exploit added on
Dec 5, 2025
Exploit action due
Dec 26, 2025
Required action
Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

Weaknesses

nvd@nist.gov
CWE-502

Social media

Hype score is a measure of social media activity compared against trending CVEs from the past 12 months. Max score 100.

Hype score

2

  1. Yeah I found a Critical RCE (CVE-2025-55182) , waiting my bounty $,$$$ Tips: 1/n 1- let's say your target is https://t.co/onrBfOlYDJ 2- College all subdomains that you seen it's a Development,stage websites. 3- Install this tool https://t.co/1NIvX1lrrR https://t.co/VGBIlonaZR

    @a7mad__n1

    13 Mar 2026

    361 Impressions

    3 Retweets

    15 Likes

    16 Bookmarks

    2 Replies

    0 Quotes

  2. my server with openclaw was hacked today all because of CVE-2025-55182 ("React2Shell") attacker just put 2 xmr miners and 20(!) reverse shells if you have React 19 + Next.js 15.x with Server Components UPDATE IMMEDIATELY

    @sikorskymark

    13 Mar 2026

    88 Impressions

    0 Retweets

    1 Like

    0 Bookmarks

    0 Replies

    0 Quotes

  3. remember the react2shell CVE from dec '25? so apparently the guy found it using deepwiki... (CVE-2025-55182) https://t.co/LXEbSP52LV

    @itsandrewgao

    12 Mar 2026

    5614 Impressions

    2 Retweets

    46 Likes

    9 Bookmarks

    3 Replies

    0 Quotes

  4. #VulnerabilityReport #cryptomining React Under Siege: Two IPs Drive 56% of Critical CVE-2025-55182 Attacks https://t.co/wObatnHEtw

    @Komodosec

    11 Mar 2026

    106 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  5. A POC for CVE-2025-55182 https://t.co/TSxW0cQPio https://t.co/vYxlZpNG76

    @buildwithJohnn

    11 Mar 2026

    35 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  6. TRC analysis shows attackers exploited React Server Components (CVE-2025-55182) and XWiki vulnerabilities to gain initial cloud access, then manipulated IAM roles for privilege escalation. Lateral movement through compromised cloud services demonstrates how initial exploits

    @aviatrixtrc

    10 Mar 2026

    135 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  7. 🚨 New Security Research: React2Shell CVE-2025-55182 A critical RCE vulnerability (CVSS 10.0) impacting React Server Components and Next.js. A single malicious request could lead to full server compromise. (Microsoft)In this analysis, we break down exploitation, impact, and ho

    @securelic

    9 Mar 2026

    80 Impressions

    2 Retweets

    1 Like

    0 Bookmarks

    0 Replies

    0 Quotes

  8. North Korea-linked hackers exploit React2Shell (CVE-2025-55182) to breach crypto firms, steal AWS credentials, and exfiltrate data from S3, EC2, and other cloud resources. #APT #CryptoSecurity https://t.co/o9wMoeS3tN

    @threatcluster

    9 Mar 2026

    92 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  9. 🚨 Security Alert Ctrl-Alt-Intel reports suspected North Korea-linked hackers targeting staking platforms & crypto exchanges. They exploited React2Shell (CVE-2025-55182) and stolen AWS keys to access cloud resources, pulling secrets from S3, EC2, RDS, Kubernetes & Doc

    @DigitShield_HQ

    9 Mar 2026

    149 Impressions

    0 Retweets

    2 Likes

    0 Bookmarks

    2 Replies

    0 Quotes

  10. 🚨 安全警示 Ctrl-Alt-Intel 報告疑似與朝鮮相關黑客,針對質押平台及加密交易所發動攻擊。 佢哋利用 React2Shell (CVE-2025-55182) 漏洞同被盜 AWS 憑證入侵雲端,提取 S3、EC2、RDS、Kubernetes 及 Docker 密鑰。 雲端密鑰係

    @DigitShield_ZH

    9 Mar 2026

    0 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  11. Top 5 Trending CVEs: 1 - CVE-2024-1086 2 - CVE-2022-40982 3 - CVE-2025-24252 4 - CVE-2025-55182 5 - CVE-2026-21533 #cve #cvetrends #cveshield #cybersecurity https://t.co/4Fua3CAN6W

    @CVEShield

    9 Mar 2026

    210 Impressions

    0 Retweets

    2 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  12. 吴说获悉,安全研究机构 Ctrl-Alt-Intel 披露,一组疑似与朝鲜有关的黑客针对质押平台、交易所软件供应商及加密交易所发起攻击。攻击者利用 React2Shell 漏洞(CVE-2025-55182) 及已获取的 AWS 访问凭证入侵云环境,枚

    @wublockchain12

    9 Mar 2026

    2362 Impressions

    0 Retweets

    0 Likes

    1 Bookmark

    1 Reply

    0 Quotes

  13. 吴说获悉,安全研究机构 Ctrl-Alt-Intel 披露,一组疑似与朝鲜有关的黑客针对质押平台、交易所软件供应商及加密交易所发起攻击。攻击者利用 React2Shell 漏洞(CVE-2025-55182) 及已获取的 AWS 访问凭证入侵云环境,枚

    @wublockchain12

    9 Mar 2026

    561 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  14. 🚨 Critical React flaw (CVE-2025-55182) allows server code execution via React Server Components. 8M+ attempts logged. If you built with Next.js or AI tools, patch now. We check for this in VibeShield scans. Action: Run `npm update next react` now. 🔐

    @vibeshield

    7 Mar 2026

    138 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  15. Pro-Palestinian and pro-Iranian ransomware operators are shifting from Sicarii to BQTLock ransomware, which is now offering free access to hacktivists targeting Israeli, U.S., and UAE organizations. The group is exploiting a critical React vulnerability (CVE-2025-55182) that

    @cybernewslive

    6 Mar 2026

    425 Impressions

    1 Retweet

    2 Likes

    2 Bookmarks

    0 Replies

    0 Quotes

  16. CVE-2025-55182 (React2Shell): unauthenticated RCE via unsafe deserialization in React Server Components. Meanwhile a LexisNexis breach claim is circulating with key details still unverified. Two very different threat surfaces. Both your problem. #appsec

    @wastelandweekly

    4 Mar 2026

    110 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  17. React2Shell CVE-2025-55182 https://t.co/6Z73pAZLsL https://t.co/XGSp1XGnEv

    @DeployPurp68996

    4 Mar 2026

    0 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  18. React2Shell CVE-2025-55182 https://t.co/6Z73pAZLsL https://t.co/pg43vKOjfj

    @DeployPurp68996

    4 Mar 2026

    0 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  19. React2Shell CVE-2025-55182 The React2Shell vulnerability https://t.co/6Z73pAZLsL https://t.co/VmNSpmO1Zn

    @DeployPurp68996

    4 Mar 2026

    0 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  20. オープンソースを装ったツールがReact2Shell脆弱性(CVE-2025-55182)を悪用するマルウェア拡散の媒体となっていた。複数脅威グループが関与する脆弱性悪用事例。#Malware #WeaponizedCVE https://t.co/3POUiz5CZu

    @01ra66it

    3 Mar 2026

    38 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  21. I just completed React2Shell: CVE-2025-55182 room on TryHackMe! Explore the CVE-2025-55182 vulnerability in React server components. https://t.co/AohXmgNSLC #tryhackme via @tryhackme

    @ToTo13ru_xakep

    3 Mar 2026

    106 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  22. Hey guys, heads up — patch your Next.js if you haven't. CVE-2025-55182 is a CVSS 10.0 RCE, actively exploited in the wild to drop crypto miners. Got hit ourselves on the devnet server. 👉 https://t.co/xowphLmQjr is back up.

    @ExoHashIO

    3 Mar 2026

    126 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  23. 最新漏洞复现!CVE-2025-55182 远程代码执行 #漏洞复现 #远程代码执行 #信息安全 #黑客 #漏洞挖掘 https://t.co/dyVqEHMC2R

    @chngxyun21210

    2 Mar 2026

    6 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  24. I’ve just released my full research on CVE-2025-55182, better known as React2Shell. With a CVSS score of 10.0, this isn't just a bug—it’s a total shift in the web security landscape. Check it 👇🏻👇🏻 https://t.co/WT9qVfr2ba https://t.co/JU2XnZKLrH

    @SesanduRamath_

    27 Feb 2026

    44 Impressions

    0 Retweets

    1 Like

    0 Bookmarks

    0 Replies

    0 Quotes

  25. I just completed React2Shell: CVE-2025-55182 room on TryHackMe! Explore the CVE-2025-55182 vulnerability in React server components. https://t.co/AHedGlvhl0 #tryhackme via @tryhackme

    @JayeshV88153533

    27 Feb 2026

    52 Impressions

    0 Retweets

    1 Like

    0 Bookmarks

    0 Replies

    0 Quotes

  26. A new report reveals that attackers focus on a tiny fraction of security flaws, exploiting just 1% of discovered vulnerabilities. These targeted flaws — React2Shell (CVE-2025-55182), Microsoft SharePoint (CVE-2025-53770), and SAP NetWeaver (CVE-2025-31324) — are exploited

    @cybernewslive

    26 Feb 2026

    70 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  27. I just completed React2Shell: CVE-2025-55182 room on TryHackMe! Explore the CVE-2025-55182 vulnerability in React server components. https://t.co/GE0HXnZ2YS #tryhackme через @tryhackme

    @mrBr4un

    25 Feb 2026

    73 Impressions

    0 Retweets

    1 Like

    0 Bookmarks

    1 Reply

    0 Quotes

  28. React2shell: CVE-2025-55182 Critical RCE Vulnerability in React and Next.js https://t.co/5GTYLQIZJM

    @Djax_Alpha

    25 Feb 2026

    123 Impressions

    0 Retweets

    1 Like

    1 Bookmark

    0 Replies

    0 Quotes

  29. A critical vulnerability in React Server Components (CVE-2025-55182) impacts React 19 and frameworks including Next.js (CVE-2025-66478). Protections have been deployed in coordination with industry partners. Upgrade to the latest patched versions immediately. https://t.co/IDLOD

    @noahwritescodes

    25 Feb 2026

    26 Impressions

    0 Retweets

    1 Like

    0 Bookmarks

    0 Replies

    0 Quotes

  30. New "ILovePoop" toolkit scans millions of IPs for React2Shell exposure (CVE-2025-55182, CVSS 10 RCE in React Server Components/Next.js). Likely state-sponsored actor targets US gov (NASA/DoD), finance (JPMorgan/Goldman), corps (Salesforce/Netflix), energy. Probes ramp up ~45 days

    @BreachBrief

    24 Feb 2026

    83 Impressions

    0 Retweets

    1 Like

    0 Bookmarks

    0 Replies

    0 Quotes

  31. 🚩 New Toolkit Used to Scan for React2Shell Exposure https://t.co/3aD9xPkuMv React2Shell (CVE-2025-55182) isn’t fading. Months after disclosure, a toolkit dubbed “ILovePoop” has been used to scan tens of millions of IPs, including government, defense, finance, and energ

    @Huntio

    23 Feb 2026

    1094 Impressions

    3 Retweets

    15 Likes

    4 Bookmarks

    1 Reply

    0 Quotes

  32. #threatreport #MediumCompleteness To Cache A Predator: ILOVEPOOP Toolkit Discovery, Global Traffic & Honeypot Observations Exploiting React2Shell (CVE-2025-55182) | 06-02-2026 Source: https://t.co/tRWJvVk4LJ Key details below ↓ 💀Threats: Ilovepoop_tool, React2shell_vuln

    @rst_cloud

    22 Feb 2026

    110 Impressions

    0 Retweets

    1 Like

    0 Bookmarks

    0 Replies

    0 Quotes

  33. 🚨 Attackers Deploy “ILovePoop” Toolkit to Mass-Scan for React2Shell (CVE-2025-55182) Big-Game Targets Dark Reading reports a sophisticated scanning toolkit (“ILovePoop”) probing tens of millions of IPs to find React2Shell-exposed Next.js/React Server Components, with t

    @ThreatSynop

    20 Feb 2026

    48 Impressions

    0 Retweets

    1 Like

    0 Bookmarks

    0 Replies

    0 Quotes

  34. 📌 A Look Back at React2Shell: Dissecting a Real Next.js RCE https://t.co/ZuBF0HYS3Q During this investigation, our analysts examined a live exploitation of CVE-2025-55182 (“React2Shell”) against a production Next.js app. Attackers achieved RCE via child_process.spawnSyn

    @Huntio

    19 Feb 2026

    541 Impressions

    1 Retweet

    3 Likes

    3 Bookmarks

    0 Replies

    0 Quotes

  35. CVE-2025-55182: React Server Components RCE—CVSS 10.0, one request, game over. But the headline? Malware fully generated by LLM, jailbroken with "Research Purpose Only." Script kiddies don't need to code anymore—just prompt. Cybercrime democratization wasn't a buzzword. It's

    @CisoRaging77913

    19 Feb 2026

    53 Impressions

    0 Retweets

    1 Like

    0 Bookmarks

    0 Replies

    0 Quotes

  36. 🚨 CRITICAL THREAT ALERT 🚨 🔍 React2Shell CVE-2025-55182 — Multiple Threat Actors Actively Exploiting React Server Components RCE (CVSS 10.0) 🎯 Threat Actor: Multiple (UNC5174, UNC6600, UNC6586, UNC6588, UNC6595, UNC6603, Earth Lamia, Jackpot Panda, Iran-nexus, fina

    @threadlinqs

    18 Feb 2026

    0 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  37. TrendAI™ Research’s analysis of React2Shell (CVE-2025-55182) reveals a landscape filled with fake scanners and tools with many spreading misinformation or even introducing backdoors. Read our analysis: https://t.co/sowwCiAZeW

    @trendai_RSRCH

    17 Feb 2026

    364 Impressions

    0 Retweets

    1 Like

    1 Bookmark

    0 Replies

    0 Quotes

  38. TrendAI™ Research’s analysis of React2Shell (CVE-2025-55182) reveals a landscape filled with fake scanners and tools with many spreading misinformation or even introducing backdoors. Read our analysis: https://t.co/sowwCiAZeW

    @trendai_RSRCH

    15 Feb 2026

    425 Impressions

    1 Retweet

    2 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  39. React2Shell (CVE-2025-55182) で気付いた React Server Components のセキュリティの盲点|kazukinagata https://t.co/1AldORnk4x #zenn

    @miraclemasui

    15 Feb 2026

    677 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  40. BREAKING NEWS : Critical React Native Exploit (CVE-2025-55182). Attackers are targeting the Metro Bundler to execute remote code on developer machines. If you build mobile apps, your dev environment is the target. DependGuard Status: BLOCKED. Our real-time dependency https://

    @DependGuard

    15 Feb 2026

    98 Impressions

    1 Retweet

    2 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  41. 🚨 CVE-2025-55182: React Server Components RCE (CVSS 10.0) — 10+ threat groups actively exploiting. China & Iran-nexus actors confirmed. 41 IOCs | 38 MITRE techniques | 4 CVEs ↓ https://t.co/Ktyx5RLFU6 #RCE #ZeroDay #React #ThreatIntel

    @threadlinqs

    15 Feb 2026

    2 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  42. Sample is now on VT! 🚩Hash: ba43e447e63611d365300bf2e8e43ccb02ea112778d0d555ef9a9ccf6169808b 🎯Malware name: Multiple:React2shell 🔹Comment: Analysis of React Server Components RCE vulnerability (CVE-2025-55182) exploitation leading to cryptojacking campaigns targeting Ne

    @Now_on_VT

    14 Feb 2026

    1698 Impressions

    4 Retweets

    21 Likes

    5 Bookmarks

    2 Replies

    0 Quotes

  43. CVE-2025-55182 #BugBounty #cve https://t.co/io5FAbK2QZ

    @fbtgigcom

    14 Feb 2026

    105 Impressions

    0 Retweets

    2 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  44. UPDATE !! 🚧 WAFs blocking your payloads? Not anymore. 🚀 NextRce v2.2 is out! Now featuring a specialized UTF-16LE Encoding Engine to bypass WAF signatures while exploiting CVE-2025-55182. 👻 The "Ghost Mode" encodes malicious JSON payloads to evade filters, but the Nex

    @TheMsterDoctor1

    13 Feb 2026

    12392 Impressions

    45 Retweets

    263 Likes

    256 Bookmarks

    0 Replies

    0 Quotes

  45. React2Shellを悪用する複数の攻撃アクターによる侵害事例 - 一般社団法人 JPCERT コーディネーションセンター(JPCERT/CC Eyes) 2025年12月3日(現地時間)、React Server Components(RSC)における認証不要のリモートコード

    @kawn2020

    13 Feb 2026

    69 Impressions

    0 Retweets

    1 Like

    0 Bookmarks

    0 Replies

    0 Quotes

  46. TrendAI™ Research confirms CVE-2025-55182 is actively exploited in the wild, with malware campaigns deploying Cobalt Strike beacons, Nezha, FRP, Sliver, and Secret-Hunter payloads. Read our in-depth analysis: https://t.co/sowwCiAZeW

    @trendai_RSRCH

    12 Feb 2026

    341 Impressions

    0 Retweets

    3 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  47. TrendAI™ Research’s analysis of React2Shell (CVE-2025-55182) reveals a landscape filled with fake scanners and tools with many spreading misinformation or even introducing backdoors. Read our analysis: https://t.co/sowwCiAZeW

    @trendai_RSRCH

    12 Feb 2026

    3483 Impressions

    1 Retweet

    3 Likes

    2 Bookmarks

    0 Replies

    1 Quote

  48. 🚨 𝐓𝐡𝐞 𝐑𝐢𝐬𝐞 𝐨𝐟 𝐕𝐢𝐛𝐞𝐜𝐨𝐝𝐢𝐧𝐠: 𝐀𝐈-𝐆𝐞𝐧𝐞𝐫𝐚𝐭𝐞𝐝 𝐌𝐚𝐥𝐰𝐚𝐫𝐞 𝐄𝐱𝐩𝐥𝐨𝐢𝐭𝐬 𝐑𝐞𝐚𝐜𝐭𝟐𝐒𝐡𝐞𝐥𝐥 • AI-generated malware was observed e

    @PurpleOps_io

    12 Feb 2026

    51 Impressions

    0 Retweets

    1 Like

    0 Bookmarks

    0 Replies

    0 Quotes

  49. 🚨 AI-Generated React2Shell Exploit Drops XMRig, Infects 90+ Hosts Darktrace observed an AI-authored React2Shell (CVE-2025-55182) exploitation toolkit used to achieve RCE on vulnerable React/Next.js targets and deploy the XMRig Monero miner, with mining pool telemetry indicatin

    @ThreatSynop

    11 Feb 2026

    68 Impressions

    0 Retweets

    1 Like

    0 Bookmarks

    1 Reply

    0 Quotes

  50. Darktrace captures AI-generated malware exploiting React2Shell flaw (CVE-2025-55182). Rated 10.0 CVSS, this critical vulnerability in React's Flight protocol allows unauthenticated remote code execution on Next.js servers. Threat actors began exploitation within 20 hours of

    @RoryCrave

    11 Feb 2026

    107 Impressions

    0 Retweets

    2 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

Configurations