CVE-2025-55182
Published Dec 3, 2025
Last updated 3 months ago
- Description
- A pre-authentication remote code execution vulnerability exists in React Server Components versions 19.0.0, 19.1.0, 19.1.1, and 19.2.0 including the following packages: react-server-dom-parcel, react-server-dom-turbopack, and react-server-dom-webpack. The vulnerable code unsafely deserializes payloads from HTTP requests to Server Function endpoints.
- Source
- cve-assign@fb.com
- NVD status
- Analyzed
- Products
- react, next.js
CVSS 3.1
- Type
- Secondary
- Base score
- 10
- Impact score
- 6
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
- Severity
- CRITICAL
Data from CISA
- Vulnerability name
- Meta React Server Components Remote Code Execution Vulnerability
- Exploit added on
- Dec 5, 2025
- Exploit action due
- Dec 26, 2025
- Required action
- Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- nvd@nist.gov
- CWE-502
Hype score is a measure of social media activity compared against trending CVEs from the past 12 months. Max score 100.
- Hype score
2
Yeah I found a Critical RCE (CVE-2025-55182) , waiting my bounty $,$$$ Tips: 1/n 1- let's say your target is https://t.co/onrBfOlYDJ 2- College all subdomains that you seen it's a Development,stage websites. 3- Install this tool https://t.co/1NIvX1lrrR https://t.co/VGBIlonaZR
@a7mad__n1
13 Mar 2026
361 Impressions
3 Retweets
15 Likes
16 Bookmarks
2 Replies
0 Quotes
my server with openclaw was hacked today all because of CVE-2025-55182 ("React2Shell") attacker just put 2 xmr miners and 20(!) reverse shells if you have React 19 + Next.js 15.x with Server Components UPDATE IMMEDIATELY
@sikorskymark
13 Mar 2026
88 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
remember the react2shell CVE from dec '25? so apparently the guy found it using deepwiki... (CVE-2025-55182) https://t.co/LXEbSP52LV
@itsandrewgao
12 Mar 2026
5614 Impressions
2 Retweets
46 Likes
9 Bookmarks
3 Replies
0 Quotes
#VulnerabilityReport #cryptomining React Under Siege: Two IPs Drive 56% of Critical CVE-2025-55182 Attacks https://t.co/wObatnHEtw
@Komodosec
11 Mar 2026
106 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
A POC for CVE-2025-55182 https://t.co/TSxW0cQPio https://t.co/vYxlZpNG76
@buildwithJohnn
11 Mar 2026
35 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
TRC analysis shows attackers exploited React Server Components (CVE-2025-55182) and XWiki vulnerabilities to gain initial cloud access, then manipulated IAM roles for privilege escalation. Lateral movement through compromised cloud services demonstrates how initial exploits
@aviatrixtrc
10 Mar 2026
135 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 New Security Research: React2Shell CVE-2025-55182 A critical RCE vulnerability (CVSS 10.0) impacting React Server Components and Next.js. A single malicious request could lead to full server compromise. (Microsoft)In this analysis, we break down exploitation, impact, and ho
@securelic
9 Mar 2026
80 Impressions
2 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
North Korea-linked hackers exploit React2Shell (CVE-2025-55182) to breach crypto firms, steal AWS credentials, and exfiltrate data from S3, EC2, and other cloud resources. #APT #CryptoSecurity https://t.co/o9wMoeS3tN
@threatcluster
9 Mar 2026
92 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 Security Alert Ctrl-Alt-Intel reports suspected North Korea-linked hackers targeting staking platforms & crypto exchanges. They exploited React2Shell (CVE-2025-55182) and stolen AWS keys to access cloud resources, pulling secrets from S3, EC2, RDS, Kubernetes & Doc
@DigitShield_HQ
9 Mar 2026
149 Impressions
0 Retweets
2 Likes
0 Bookmarks
2 Replies
0 Quotes
🚨 安全警示 Ctrl-Alt-Intel 報告疑似與朝鮮相關黑客,針對質押平台及加密交易所發動攻擊。 佢哋利用 React2Shell (CVE-2025-55182) 漏洞同被盜 AWS 憑證入侵雲端,提取 S3、EC2、RDS、Kubernetes 及 Docker 密鑰。 雲端密鑰係
@DigitShield_ZH
9 Mar 2026
0 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Top 5 Trending CVEs: 1 - CVE-2024-1086 2 - CVE-2022-40982 3 - CVE-2025-24252 4 - CVE-2025-55182 5 - CVE-2026-21533 #cve #cvetrends #cveshield #cybersecurity https://t.co/4Fua3CAN6W
@CVEShield
9 Mar 2026
210 Impressions
0 Retweets
2 Likes
0 Bookmarks
0 Replies
0 Quotes
吴说获悉,安全研究机构 Ctrl-Alt-Intel 披露,一组疑似与朝鲜有关的黑客针对质押平台、交易所软件供应商及加密交易所发起攻击。攻击者利用 React2Shell 漏洞(CVE-2025-55182) 及已获取的 AWS 访问凭证入侵云环境,枚
@wublockchain12
9 Mar 2026
2362 Impressions
0 Retweets
0 Likes
1 Bookmark
1 Reply
0 Quotes
吴说获悉,安全研究机构 Ctrl-Alt-Intel 披露,一组疑似与朝鲜有关的黑客针对质押平台、交易所软件供应商及加密交易所发起攻击。攻击者利用 React2Shell 漏洞(CVE-2025-55182) 及已获取的 AWS 访问凭证入侵云环境,枚
@wublockchain12
9 Mar 2026
561 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 Critical React flaw (CVE-2025-55182) allows server code execution via React Server Components. 8M+ attempts logged. If you built with Next.js or AI tools, patch now. We check for this in VibeShield scans. Action: Run `npm update next react` now. 🔐
@vibeshield
7 Mar 2026
138 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Pro-Palestinian and pro-Iranian ransomware operators are shifting from Sicarii to BQTLock ransomware, which is now offering free access to hacktivists targeting Israeli, U.S., and UAE organizations. The group is exploiting a critical React vulnerability (CVE-2025-55182) that
@cybernewslive
6 Mar 2026
425 Impressions
1 Retweet
2 Likes
2 Bookmarks
0 Replies
0 Quotes
CVE-2025-55182 (React2Shell): unauthenticated RCE via unsafe deserialization in React Server Components. Meanwhile a LexisNexis breach claim is circulating with key details still unverified. Two very different threat surfaces. Both your problem. #appsec
@wastelandweekly
4 Mar 2026
110 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
React2Shell CVE-2025-55182 https://t.co/6Z73pAZLsL https://t.co/XGSp1XGnEv
@DeployPurp68996
4 Mar 2026
0 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
React2Shell CVE-2025-55182 https://t.co/6Z73pAZLsL https://t.co/pg43vKOjfj
@DeployPurp68996
4 Mar 2026
0 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
React2Shell CVE-2025-55182 The React2Shell vulnerability https://t.co/6Z73pAZLsL https://t.co/VmNSpmO1Zn
@DeployPurp68996
4 Mar 2026
0 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
オープンソースを装ったツールがReact2Shell脆弱性(CVE-2025-55182)を悪用するマルウェア拡散の媒体となっていた。複数脅威グループが関与する脆弱性悪用事例。#Malware #WeaponizedCVE https://t.co/3POUiz5CZu
@01ra66it
3 Mar 2026
38 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
I just completed React2Shell: CVE-2025-55182 room on TryHackMe! Explore the CVE-2025-55182 vulnerability in React server components. https://t.co/AohXmgNSLC #tryhackme via @tryhackme
@ToTo13ru_xakep
3 Mar 2026
106 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Hey guys, heads up — patch your Next.js if you haven't. CVE-2025-55182 is a CVSS 10.0 RCE, actively exploited in the wild to drop crypto miners. Got hit ourselves on the devnet server. 👉 https://t.co/xowphLmQjr is back up.
@ExoHashIO
3 Mar 2026
126 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
最新漏洞复现!CVE-2025-55182 远程代码执行 #漏洞复现 #远程代码执行 #信息安全 #黑客 #漏洞挖掘 https://t.co/dyVqEHMC2R
@chngxyun21210
2 Mar 2026
6 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
I’ve just released my full research on CVE-2025-55182, better known as React2Shell. With a CVSS score of 10.0, this isn't just a bug—it’s a total shift in the web security landscape. Check it 👇🏻👇🏻 https://t.co/WT9qVfr2ba https://t.co/JU2XnZKLrH
@SesanduRamath_
27 Feb 2026
44 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
I just completed React2Shell: CVE-2025-55182 room on TryHackMe! Explore the CVE-2025-55182 vulnerability in React server components. https://t.co/AHedGlvhl0 #tryhackme via @tryhackme
@JayeshV88153533
27 Feb 2026
52 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
A new report reveals that attackers focus on a tiny fraction of security flaws, exploiting just 1% of discovered vulnerabilities. These targeted flaws — React2Shell (CVE-2025-55182), Microsoft SharePoint (CVE-2025-53770), and SAP NetWeaver (CVE-2025-31324) — are exploited
@cybernewslive
26 Feb 2026
70 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
I just completed React2Shell: CVE-2025-55182 room on TryHackMe! Explore the CVE-2025-55182 vulnerability in React server components. https://t.co/GE0HXnZ2YS #tryhackme через @tryhackme
@mrBr4un
25 Feb 2026
73 Impressions
0 Retweets
1 Like
0 Bookmarks
1 Reply
0 Quotes
React2shell: CVE-2025-55182 Critical RCE Vulnerability in React and Next.js https://t.co/5GTYLQIZJM
@Djax_Alpha
25 Feb 2026
123 Impressions
0 Retweets
1 Like
1 Bookmark
0 Replies
0 Quotes
A critical vulnerability in React Server Components (CVE-2025-55182) impacts React 19 and frameworks including Next.js (CVE-2025-66478). Protections have been deployed in coordination with industry partners. Upgrade to the latest patched versions immediately. https://t.co/IDLOD
@noahwritescodes
25 Feb 2026
26 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
New "ILovePoop" toolkit scans millions of IPs for React2Shell exposure (CVE-2025-55182, CVSS 10 RCE in React Server Components/Next.js). Likely state-sponsored actor targets US gov (NASA/DoD), finance (JPMorgan/Goldman), corps (Salesforce/Netflix), energy. Probes ramp up ~45 days
@BreachBrief
24 Feb 2026
83 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
🚩 New Toolkit Used to Scan for React2Shell Exposure https://t.co/3aD9xPkuMv React2Shell (CVE-2025-55182) isn’t fading. Months after disclosure, a toolkit dubbed “ILovePoop” has been used to scan tens of millions of IPs, including government, defense, finance, and energ
@Huntio
23 Feb 2026
1094 Impressions
3 Retweets
15 Likes
4 Bookmarks
1 Reply
0 Quotes
#threatreport #MediumCompleteness To Cache A Predator: ILOVEPOOP Toolkit Discovery, Global Traffic & Honeypot Observations Exploiting React2Shell (CVE-2025-55182) | 06-02-2026 Source: https://t.co/tRWJvVk4LJ Key details below ↓ 💀Threats: Ilovepoop_tool, React2shell_vuln
@rst_cloud
22 Feb 2026
110 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
🚨 Attackers Deploy “ILovePoop” Toolkit to Mass-Scan for React2Shell (CVE-2025-55182) Big-Game Targets Dark Reading reports a sophisticated scanning toolkit (“ILovePoop”) probing tens of millions of IPs to find React2Shell-exposed Next.js/React Server Components, with t
@ThreatSynop
20 Feb 2026
48 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
📌 A Look Back at React2Shell: Dissecting a Real Next.js RCE https://t.co/ZuBF0HYS3Q During this investigation, our analysts examined a live exploitation of CVE-2025-55182 (“React2Shell”) against a production Next.js app. Attackers achieved RCE via child_process.spawnSyn
@Huntio
19 Feb 2026
541 Impressions
1 Retweet
3 Likes
3 Bookmarks
0 Replies
0 Quotes
CVE-2025-55182: React Server Components RCE—CVSS 10.0, one request, game over. But the headline? Malware fully generated by LLM, jailbroken with "Research Purpose Only." Script kiddies don't need to code anymore—just prompt. Cybercrime democratization wasn't a buzzword. It's
@CisoRaging77913
19 Feb 2026
53 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
🚨 CRITICAL THREAT ALERT 🚨 🔍 React2Shell CVE-2025-55182 — Multiple Threat Actors Actively Exploiting React Server Components RCE (CVSS 10.0) 🎯 Threat Actor: Multiple (UNC5174, UNC6600, UNC6586, UNC6588, UNC6595, UNC6603, Earth Lamia, Jackpot Panda, Iran-nexus, fina
@threadlinqs
18 Feb 2026
0 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
TrendAI™ Research’s analysis of React2Shell (CVE-2025-55182) reveals a landscape filled with fake scanners and tools with many spreading misinformation or even introducing backdoors. Read our analysis: https://t.co/sowwCiAZeW
@trendai_RSRCH
17 Feb 2026
364 Impressions
0 Retweets
1 Like
1 Bookmark
0 Replies
0 Quotes
TrendAI™ Research’s analysis of React2Shell (CVE-2025-55182) reveals a landscape filled with fake scanners and tools with many spreading misinformation or even introducing backdoors. Read our analysis: https://t.co/sowwCiAZeW
@trendai_RSRCH
15 Feb 2026
425 Impressions
1 Retweet
2 Likes
0 Bookmarks
0 Replies
0 Quotes
React2Shell (CVE-2025-55182) で気付いた React Server Components のセキュリティの盲点|kazukinagata https://t.co/1AldORnk4x #zenn
@miraclemasui
15 Feb 2026
677 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
BREAKING NEWS : Critical React Native Exploit (CVE-2025-55182). Attackers are targeting the Metro Bundler to execute remote code on developer machines. If you build mobile apps, your dev environment is the target. DependGuard Status: BLOCKED. Our real-time dependency https://
@DependGuard
15 Feb 2026
98 Impressions
1 Retweet
2 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 CVE-2025-55182: React Server Components RCE (CVSS 10.0) — 10+ threat groups actively exploiting. China & Iran-nexus actors confirmed. 41 IOCs | 38 MITRE techniques | 4 CVEs ↓ https://t.co/Ktyx5RLFU6 #RCE #ZeroDay #React #ThreatIntel
@threadlinqs
15 Feb 2026
2 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Sample is now on VT! 🚩Hash: ba43e447e63611d365300bf2e8e43ccb02ea112778d0d555ef9a9ccf6169808b 🎯Malware name: Multiple:React2shell 🔹Comment: Analysis of React Server Components RCE vulnerability (CVE-2025-55182) exploitation leading to cryptojacking campaigns targeting Ne
@Now_on_VT
14 Feb 2026
1698 Impressions
4 Retweets
21 Likes
5 Bookmarks
2 Replies
0 Quotes
CVE-2025-55182 #BugBounty #cve https://t.co/io5FAbK2QZ
@fbtgigcom
14 Feb 2026
105 Impressions
0 Retweets
2 Likes
0 Bookmarks
0 Replies
0 Quotes
UPDATE !! 🚧 WAFs blocking your payloads? Not anymore. 🚀 NextRce v2.2 is out! Now featuring a specialized UTF-16LE Encoding Engine to bypass WAF signatures while exploiting CVE-2025-55182. 👻 The "Ghost Mode" encodes malicious JSON payloads to evade filters, but the Nex
@TheMsterDoctor1
13 Feb 2026
12392 Impressions
45 Retweets
263 Likes
256 Bookmarks
0 Replies
0 Quotes
React2Shellを悪用する複数の攻撃アクターによる侵害事例 - 一般社団法人 JPCERT コーディネーションセンター(JPCERT/CC Eyes) 2025年12月3日(現地時間)、React Server Components(RSC)における認証不要のリモートコード
@kawn2020
13 Feb 2026
69 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
TrendAI™ Research confirms CVE-2025-55182 is actively exploited in the wild, with malware campaigns deploying Cobalt Strike beacons, Nezha, FRP, Sliver, and Secret-Hunter payloads. Read our in-depth analysis: https://t.co/sowwCiAZeW
@trendai_RSRCH
12 Feb 2026
341 Impressions
0 Retweets
3 Likes
0 Bookmarks
0 Replies
0 Quotes
TrendAI™ Research’s analysis of React2Shell (CVE-2025-55182) reveals a landscape filled with fake scanners and tools with many spreading misinformation or even introducing backdoors. Read our analysis: https://t.co/sowwCiAZeW
@trendai_RSRCH
12 Feb 2026
3483 Impressions
1 Retweet
3 Likes
2 Bookmarks
0 Replies
1 Quote
🚨 𝐓𝐡𝐞 𝐑𝐢𝐬𝐞 𝐨𝐟 𝐕𝐢𝐛𝐞𝐜𝐨𝐝𝐢𝐧𝐠: 𝐀𝐈-𝐆𝐞𝐧𝐞𝐫𝐚𝐭𝐞𝐝 𝐌𝐚𝐥𝐰𝐚𝐫𝐞 𝐄𝐱𝐩𝐥𝐨𝐢𝐭𝐬 𝐑𝐞𝐚𝐜𝐭𝟐𝐒𝐡𝐞𝐥𝐥 • AI-generated malware was observed e
@PurpleOps_io
12 Feb 2026
51 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
🚨 AI-Generated React2Shell Exploit Drops XMRig, Infects 90+ Hosts Darktrace observed an AI-authored React2Shell (CVE-2025-55182) exploitation toolkit used to achieve RCE on vulnerable React/Next.js targets and deploy the XMRig Monero miner, with mining pool telemetry indicatin
@ThreatSynop
11 Feb 2026
68 Impressions
0 Retweets
1 Like
0 Bookmarks
1 Reply
0 Quotes
Darktrace captures AI-generated malware exploiting React2Shell flaw (CVE-2025-55182). Rated 10.0 CVSS, this critical vulnerability in React's Flight protocol allows unauthenticated remote code execution on Next.js servers. Threat actors began exploitation within 20 hours of
@RoryCrave
11 Feb 2026
107 Impressions
0 Retweets
2 Likes
0 Bookmarks
0 Replies
0 Quotes
[
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:facebook:react:19.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C66E1B0F-8C3F-4D27-9F46-B6EC78D8C60B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:facebook:react:19.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C6C1C3E2-542D-4001-BFA9-6CF5A038971D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:facebook:react:19.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "A0907E1C-E2D2-44A4-AA46-CE80BCA4E015",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:facebook:react:19.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "0030B5E1-E79E-4C48-B500-91747FE2751D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:vercel:next.js:*:*:*:*:*:node.js:*:*",
"matchCriteriaId": "FC2BCD83-CC87-4CDC-AD9B-2055912A8463",
"versionEndExcluding": "15.0.5",
"versionStartIncluding": "15.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vercel:next.js:*:*:*:*:*:node.js:*:*",
"matchCriteriaId": "C5E767D4-E46F-4CA6-A22F-4D0671B9B102",
"versionEndExcluding": "15.1.9",
"versionStartIncluding": "15.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vercel:next.js:*:*:*:*:*:node.js:*:*",
"matchCriteriaId": "5EFB6CB7-4A4F-464A-A1D8-62B50DF0B4BA",
"versionEndExcluding": "15.2.6",
"versionStartIncluding": "15.2.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vercel:next.js:*:*:*:*:*:node.js:*:*",
"matchCriteriaId": "83AF54D7-410D-42B4-853A-8A1973636542",
"versionEndExcluding": "15.3.6",
"versionStartIncluding": "15.3.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vercel:next.js:*:*:*:*:*:node.js:*:*",
"matchCriteriaId": "3D666EA7-BDAE-4E67-A331-B7403C3AA482",
"versionEndExcluding": "15.4.8",
"versionStartIncluding": "15.4.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vercel:next.js:*:*:*:*:*:node.js:*:*",
"matchCriteriaId": "E666ECDA-7A29-4D3D-AC40-357F044AD595",
"versionEndExcluding": "15.5.7",
"versionStartIncluding": "15.5.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vercel:next.js:*:*:*:*:*:node.js:*:*",
"matchCriteriaId": "CF65554E-4BF0-4344-AE7F-9E09E34E084F",
"versionEndExcluding": "16.0.7",
"versionStartIncluding": "16.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vercel:next.js:14.3.0:canary77:*:*:*:node.js:*:*",
"matchCriteriaId": "B209A306-CE1A-448D-8653-7627302399B7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vercel:next.js:14.3.0:canary78:*:*:*:node.js:*:*",
"matchCriteriaId": "D1DCAC23-7ED0-456B-8AE2-57689199F708",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vercel:next.js:14.3.0:canary79:*:*:*:node.js:*:*",
"matchCriteriaId": "8B35D612-AC2A-4697-934F-372E4D5EE3F4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vercel:next.js:14.3.0:canary80:*:*:*:node.js:*:*",
"matchCriteriaId": "A06D2291-5D89-4B76-99E0-52505634A63B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vercel:next.js:14.3.0:canary81:*:*:*:node.js:*:*",
"matchCriteriaId": "8F01F07A-79F7-4F4B-8E3A-9C7D93C83A63",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vercel:next.js:14.3.0:canary82:*:*:*:node.js:*:*",
"matchCriteriaId": "9EDA2864-F94B-48EB-98F3-FDBFCECCC4A8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vercel:next.js:14.3.0:canary83:*:*:*:node.js:*:*",
"matchCriteriaId": "4828BEE0-E891-491B-903D-A50B0E37273C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vercel:next.js:14.3.0:canary84:*:*:*:node.js:*:*",
"matchCriteriaId": "55723BB4-E62B-4034-A434-485FE0E6BAF5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vercel:next.js:14.3.0:canary85:*:*:*:node.js:*:*",
"matchCriteriaId": "19F55784-CC11-4024-9A42-EFEEF7B2366F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vercel:next.js:14.3.0:canary86:*:*:*:node.js:*:*",
"matchCriteriaId": "1D694B0A-9BCF-49C8-A787-B0AFE51C7DC5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vercel:next.js:14.3.0:canary87:*:*:*:node.js:*:*",
"matchCriteriaId": "C91F9508-E18D-4928-9DF5-DE2DDBEC56D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vercel:next.js:15.6.0:-:*:*:*:node.js:*:*",
"matchCriteriaId": "3ED7F693-8012-4F88-BC71-CF108E20664A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vercel:next.js:15.6.0:canary0:*:*:*:node.js:*:*",
"matchCriteriaId": "40EE98AC-754A-4FD9-B51A-9E2674584FD9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vercel:next.js:15.6.0:canary1:*:*:*:node.js:*:*",
"matchCriteriaId": "13B41C54-AF21-4637-A852-F997635B4E83",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vercel:next.js:15.6.0:canary10:*:*:*:node.js:*:*",
"matchCriteriaId": "91B41697-2D70-488D-A5C3-CB9D435560CA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vercel:next.js:15.6.0:canary11:*:*:*:node.js:*:*",
"matchCriteriaId": "7D43DB84-7BCF-429B-849A-7189EC1922D0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vercel:next.js:15.6.0:canary12:*:*:*:node.js:*:*",
"matchCriteriaId": "CEC2346B-8DBD-4D53-9866-CFBDD3AACEF2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vercel:next.js:15.6.0:canary13:*:*:*:node.js:*:*",
"matchCriteriaId": "2BC95097-8CA6-42FE-98D7-F968E37C11B7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vercel:next.js:15.6.0:canary14:*:*:*:node.js:*:*",
"matchCriteriaId": "4F8FA85C-1200-4FD2-B5D7-906300748BD4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vercel:next.js:15.6.0:canary15:*:*:*:node.js:*:*",
"matchCriteriaId": "5D0B177B-2A31-48E9-81C7-1024E2452486",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vercel:next.js:15.6.0:canary16:*:*:*:node.js:*:*",
"matchCriteriaId": "7CCA01F3-3A14-4450-8A68-B1DA22C685B7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vercel:next.js:15.6.0:canary17:*:*:*:node.js:*:*",
"matchCriteriaId": "1AB351AE-8C29-4E67-8699-0AAC6B3383E2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vercel:next.js:15.6.0:canary18:*:*:*:node.js:*:*",
"matchCriteriaId": "14A34D9D-5FA2-434B-836E-3CE63D716CCB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vercel:next.js:15.6.0:canary19:*:*:*:node.js:*:*",
"matchCriteriaId": "E8440F05-F32B-4D40-90B7-04BF22107D86",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vercel:next.js:15.6.0:canary2:*:*:*:node.js:*:*",
"matchCriteriaId": "FB6C6F6D-1EC0-4BD9-97A4-CFDE70DF0C43",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vercel:next.js:15.6.0:canary20:*:*:*:node.js:*:*",
"matchCriteriaId": "6189BD4C-A3E2-451B-96B2-FF01250E946D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vercel:next.js:15.6.0:canary21:*:*:*:node.js:*:*",
"matchCriteriaId": "389EE453-8B07-45DD-BE9C-277C9C5CB156",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vercel:next.js:15.6.0:canary22:*:*:*:node.js:*:*",
"matchCriteriaId": "BA4D4638-4734-4B16-87AA-EF4B5D2DDD7A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vercel:next.js:15.6.0:canary23:*:*:*:node.js:*:*",
"matchCriteriaId": "D54A2E63-6E0C-4E17-86A8-459B0A7EE00B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vercel:next.js:15.6.0:canary24:*:*:*:node.js:*:*",
"matchCriteriaId": "E6136F0A-3010-4BAD-811B-D047CF5E6F64",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vercel:next.js:15.6.0:canary25:*:*:*:node.js:*:*",
"matchCriteriaId": "525EFA40-B14B-47E9-8FBD-45721A802DB6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vercel:next.js:15.6.0:canary26:*:*:*:node.js:*:*",
"matchCriteriaId": "69142944-1EC0-4F94-862E-FA7F2E101101",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vercel:next.js:15.6.0:canary27:*:*:*:node.js:*:*",
"matchCriteriaId": "30016C06-372D-4F98-84A8-0732CA054970",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vercel:next.js:15.6.0:canary28:*:*:*:node.js:*:*",
"matchCriteriaId": "E1536E2B-84EC-46A3-9B6F-026364A9D927",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vercel:next.js:15.6.0:canary29:*:*:*:node.js:*:*",
"matchCriteriaId": "5E6F1F60-30E2-407C-8152-EEEB7EFE24CB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vercel:next.js:15.6.0:canary3:*:*:*:node.js:*:*",
"matchCriteriaId": "3C907301-2C8F-465B-8134-94130E29F5DB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vercel:next.js:15.6.0:canary30:*:*:*:node.js:*:*",
"matchCriteriaId": "E81C89FD-40CB-471E-9967-90ACDCF79373",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vercel:next.js:15.6.0:canary31:*:*:*:node.js:*:*",
"matchCriteriaId": "55E8AEEC-A686-49D6-B298-AEE4E838E769",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vercel:next.js:15.6.0:canary32:*:*:*:node.js:*:*",
"matchCriteriaId": "CB0618EC-6A0B-4AC3-BF6D-E51AC84C4E15",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vercel:next.js:15.6.0:canary33:*:*:*:node.js:*:*",
"matchCriteriaId": "7B27F133-8EB4-4761-A706-DF42D4EB55F6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vercel:next.js:15.6.0:canary34:*:*:*:node.js:*:*",
"matchCriteriaId": "BF975472-B7E7-4AC8-B834-DA19897A4894",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vercel:next.js:15.6.0:canary35:*:*:*:node.js:*:*",
"matchCriteriaId": "48A82613-F3FD-4E89-8E4A-F3F05A616171",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vercel:next.js:15.6.0:canary36:*:*:*:node.js:*:*",
"matchCriteriaId": "0D42CA1F-7C21-47C1-8A9C-1015286FCBE2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vercel:next.js:15.6.0:canary37:*:*:*:node.js:*:*",
"matchCriteriaId": "7C83A4EF-B96F-40EC-BA1F-FE1370AF78AC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vercel:next.js:15.6.0:canary38:*:*:*:node.js:*:*",
"matchCriteriaId": "C151FDAB-DE34-4A7E-9762-6E99386798BF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vercel:next.js:15.6.0:canary39:*:*:*:node.js:*:*",
"matchCriteriaId": "53025212-05F0-41FE-81F8-023B1784BB8C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vercel:next.js:15.6.0:canary4:*:*:*:node.js:*:*",
"matchCriteriaId": "68EAC2B9-32A5-4721-BB35-16D519CD1BBC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vercel:next.js:15.6.0:canary40:*:*:*:node.js:*:*",
"matchCriteriaId": "7411EF71-CBEB-4127-935F-3C732A1E22AC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vercel:next.js:15.6.0:canary41:*:*:*:node.js:*:*",
"matchCriteriaId": "0C4B8930-1B65-4894-AFA8-C323AA7A8292",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vercel:next.js:15.6.0:canary42:*:*:*:node.js:*:*",
"matchCriteriaId": "B4977345-BD8C-41C7-9DD7-1E41D6CC6438",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vercel:next.js:15.6.0:canary43:*:*:*:node.js:*:*",
"matchCriteriaId": "EFE030A4-5B14-4C2D-B953-E80C98FB26EE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vercel:next.js:15.6.0:canary44:*:*:*:node.js:*:*",
"matchCriteriaId": "9F616FD4-83BF-4A9A-AFFD-0D3E2544DC7E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vercel:next.js:15.6.0:canary45:*:*:*:node.js:*:*",
"matchCriteriaId": "00512630-8B88-43B0-9ED3-2B33C64CC9A9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vercel:next.js:15.6.0:canary46:*:*:*:node.js:*:*",
"matchCriteriaId": "A88EEF11-C7DA-4E2D-A030-FC177E696557",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vercel:next.js:15.6.0:canary47:*:*:*:node.js:*:*",
"matchCriteriaId": "BE8453D9-7275-4A5F-8732-F05662FFF2E8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vercel:next.js:15.6.0:canary48:*:*:*:node.js:*:*",
"matchCriteriaId": "E306B896-9BBB-424B-8D99-7A1A79AEFE9D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vercel:next.js:15.6.0:canary49:*:*:*:node.js:*:*",
"matchCriteriaId": "ACA87B86-33D5-4BEA-A13D-EEB4922D511E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vercel:next.js:15.6.0:canary5:*:*:*:node.js:*:*",
"matchCriteriaId": "77AA0D23-B101-445C-A260-ED3152A93D17",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vercel:next.js:15.6.0:canary50:*:*:*:node.js:*:*",
"matchCriteriaId": "7D7DCCF7-FC83-4767-A0C2-C84A8B14F93B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vercel:next.js:15.6.0:canary51:*:*:*:node.js:*:*",
"matchCriteriaId": "FD397568-7F1F-4153-AF08-B22D4D3B45F9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vercel:next.js:15.6.0:canary52:*:*:*:node.js:*:*",
"matchCriteriaId": "984416EF-B121-40CE-B3AD-E22A06BB5844",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vercel:next.js:15.6.0:canary53:*:*:*:node.js:*:*",
"matchCriteriaId": "C4B58652-EE24-43CF-8ABE-4A01B2C9938C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vercel:next.js:15.6.0:canary54:*:*:*:node.js:*:*",
"matchCriteriaId": "8090CF73-AEA7-43FC-A960-321BED3B1682",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vercel:next.js:15.6.0:canary55:*:*:*:node.js:*:*",
"matchCriteriaId": "823164E5-609D-4F24-86A5-E25618FE86A7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vercel:next.js:15.6.0:canary56:*:*:*:node.js:*:*",
"matchCriteriaId": "E13CD688-63C3-4FFA-9D13-696005F0C155",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vercel:next.js:15.6.0:canary57:*:*:*:node.js:*:*",
"matchCriteriaId": "B397B18C-8A7A-4766-9A68-98B26E190A4A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vercel:next.js:15.6.0:canary6:*:*:*:node.js:*:*",
"matchCriteriaId": "2DB345E3-BAD0-497E-93AE-5E4DC669C192",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vercel:next.js:15.6.0:canary7:*:*:*:node.js:*:*",
"matchCriteriaId": "840FEB19-2C66-4004-A488-B90219F8AC05",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vercel:next.js:15.6.0:canary8:*:*:*:node.js:*:*",
"matchCriteriaId": "C260F966-73D7-43F3-A329-8C558A695821",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vercel:next.js:15.6.0:canary9:*:*:*:node.js:*:*",
"matchCriteriaId": "28130A79-39B5-43E8-A690-C8E9C62483F8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vercel:next.js:16.0.0:-:*:*:*:node.js:*:*",
"matchCriteriaId": "5E8548AB-D9E8-4E65-AF24-9F9021F99834",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
]