CVE-2025-55182

Published Dec 3, 2025

Last updated 5 months ago

Exploit knownCVSS critical 10.0
npm
React
react2shell
Supply chain
Business logic
Cloud
OT

Overview

Description
A pre-authentication remote code execution vulnerability exists in React Server Components versions 19.0.0, 19.1.0, 19.1.1, and 19.2.0 including the following packages: react-server-dom-parcel, react-server-dom-turbopack, and react-server-dom-webpack. The vulnerable code unsafely deserializes payloads from HTTP requests to Server Function endpoints.
Source
cve-assign@fb.com
NVD status
Analyzed
Products
react, next.js

Risk scores

CVSS 3.1

Type
Secondary
Base score
10
Impact score
6
Exploitability score
3.9
Vector string
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Severity
CRITICAL

Known exploits

Data from CISA

Vulnerability name
Meta React Server Components Remote Code Execution Vulnerability
Exploit added on
Dec 5, 2025
Exploit action due
Dec 26, 2025
Required action
Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

Weaknesses

nvd@nist.gov
CWE-502

Social media

Hype score is a measure of social media activity compared against trending CVEs from the past 12 months. Max score 100.

Hype score

29

  1. 900+ companies hacked. One vulnerability. One automated pipeline. Hackers are using AI + Telegram bots to exploit React2Shell (CVE-2025-55182) at scale stealing credentials, cloud access, and financial data in minutes. This isn’t random hacking. It’s organized, automated, a

    @MarcelVelica

    28 Apr 2026

    36363 Impressions

    2 Retweets

    141 Likes

    2 Bookmarks

    2 Replies

    0 Quotes

  2. NEW THREAT INTEL: Bissa Scanner -- AI-orchestrated mass exploitation of CVE-2025-55182 (Next.js RCE) and CVE-2025-9501 (W3 Total Cache). 9 detections, 29 IOCs. https://t.co/bVuLbIIj1p #ThreatIntel #CyberSecurity #CVE #Nextjs #WordPress https://t.co/w9wVc3LQZj

    @threadlinqs

    27 Apr 2026

    233 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  3. Intel Report [CRITICAL] - A newly exposed threat actor infrastructure has revealed a large-scale automated exploitation campaign leveraging a critical vulnerability in Next.js, tracked as CVE-2025-55182 and referred to as "React2Shell," to compromise... https://t.co/DIJWLbVY4k

    @EnigmaGlobalSW

    26 Apr 2026

    175 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  4. 🚨 React2Shell (CVE-2025-55182) ile Büyük Çaplı Saldırı: 900+ Şirket Tehlikeye Girdi https://t.co/dwbVjtRAwP @LinkedIn aracılığıyla

    @AturcDestek

    25 Apr 2026

    134 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  5. 🚨 Critical Next.js CVE-2025-55182 is being exploited live. Allows app takeover & credential theft. If you deployed via v0/Lovable, verify your version. AI won't auto-patch this. We flag this in VibeShield scans. Update Next.js now! 🔐 #NextJS

    @vibeshield

    24 Apr 2026

    134 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  6. 🚨 One hacker. One Telegram bot. 900+ companies breached. Bissa Scanner exploited CVE-2025-55182 (React2Shell) at internet scale AWS, OpenAI, Stripe keys all stolen. Full breakdown 👇 https://t.co/sfIX76Be0b #CyberSecurity #ThreatIntel #InfoSec https://t.co/tz1puWxGgd

    @Xploitzone_01

    24 Apr 2026

    139 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  7. Dr. Tube’s AI-assisted Bissa scanner exploited 900+ companies using React2Shell (CVE-2025-55182) to steal 30,000 .env files. See the AI-led attack workflow. #AICyberAttack #BissaScanner #React2Shell #InfoSec #CyberSecurity #CloudSecurity #DrTube https://t.co/3HmFuBFogI https:/

    @the_yellow_fall

    24 Apr 2026

    434 Impressions

    0 Retweets

    6 Likes

    2 Bookmarks

    0 Replies

    1 Quote

  8. An exposed server reveals AI-driven mass exploitation using Bissa Scanner and React2Shell (CVE-2025-55182), confirming 900+ breaches and harvesting thousands of credentials with Claude Code and Telegram bots. #BissaScanner #AIExploitation https://t.co/2dxCJ3CgRt

    @TweetThreatNews

    23 Apr 2026

    269 Impressions

    0 Retweets

    1 Like

    0 Bookmarks

    0 Replies

    0 Quotes

  9. 🔴 CVE-2025-55182 (React2Shell) RCE in React Server Components. no auth. deterministic. Flight checks "has .then?" to detect Promises Object.prototype.then = () => { /* full control */ } write-up: https://t.co/51g0s2jcWJ repo: https://t.co/R6joVAWJTL @reactjs https:/

    @devianntsec

    23 Apr 2026

    2 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  10. 🔴 CVE-2025-55182 (React2Shell) RCE en React Server Components. sin auth. determinista. probabilidad 1. Flight pregunta "¿tiene .then?" para detectar Promises. Object.prototype.then = () => { /* control total */ } https://t.co/a9k5Hx4fka https://t.co/R6joVAWJTL

    @devianntsec

    23 Apr 2026

    4 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  11. Claude Code + OpenClaw used with the React2Shell (CVE-2025-55182) bug to exploit 900+ targets extracting "tens of thousands of .env files yielding credentials across AI, cloud, payments, messaging, and databases." Threat actor used Telegram for alerting. https://t.co/lFNXznNMzv

    @Jeremy_Kirk

    22 Apr 2026

    387 Impressions

    1 Retweet

    3 Likes

    2 Bookmarks

    0 Replies

    0 Quotes

  12. Bissa scanner: open server exposes AI-assisted credential harvesting chaining Claude Code + OpenClaw with React2Shell (CVE-2025-55182). Full operator pipeline caught live. https://t.co/QWVsaNVwQO #infosec #AI #CVE

    @CyberDaily_News

    22 Apr 2026

    185 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  13. React2Shell(CVE-2025-55182)を悪用し.envファイルを中心に狙った大規模な認証情報窃取(最大のターゲットはAnthropic・Google・OpenAI・Mistral等の生成AIのAPIキー)オペレーションに関する新たなレポートが公開されて

    @MalwareBibleJP

    22 Apr 2026

    985 Impressions

    2 Retweets

    11 Likes

    5 Bookmarks

    0 Replies

    0 Quotes

  14. Unit 42 reports a 282% increase in Kubernetes attacks. Stolen tokens and CVE-2025-55182 led to millions in thefts from crypto exchanges. https://t.co/2TiznewFv5 #Security #CloudSecurity #Kubernetes #NorthKorea - Follow for more

    @techzine

    20 Apr 2026

    123 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  15. Unit 42 ziet Kubernetes-aanvallen met 282% stijgen. Gestolen tokens en CVE-2025-55182 leidden tot miljoenendiefstallen bij cryptobeurzen. https://t.co/FIt7qbDGom #Security #CloudSecurity #Kubernetes #NoordKorea #PaloAltoNetworks

    @Techzinenlbe

    20 Apr 2026

    154 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  16. A critical remote code execution vulnerability (CVE-2025-55182) affects React Server Components 19.0.0–19.2.0. https://t.co/xRdmnRxePU #CyberSecurity #ReactJS #RCE #CVE202555182 #ReactSecurity #WebSecurity #InfoSec #PatchNow #DevSecOps https://t.co/68BQw1kuvk

    @redsecuretech

    18 Apr 2026

    171 Impressions

    1 Retweet

    1 Like

    0 Bookmarks

    0 Replies

    0 Quotes

  17. 【フロカン名古屋は5/9🦘】 フロントエンドカンファレンス名古屋のトークをご紹介! 「CVE-2025-55182の徹底解析と実践的防御設計」 坂津 潤平さん (@saka2jp) https://t.co/IVwzX3VUdK #fec_nagoya

    @fec_nagoya

    18 Apr 2026

    440 Impressions

    0 Retweets

    2 Likes

    0 Bookmarks

    0 Replies

    1 Quote

  18. حملة ضخمة تستغل ثـ ـغرة CVE-2025-55182 لاخـ ـتـ راق تطبيقات Next.js وسـ ـرقة بيانات حسـ ـاسة التفاصيل... https://t.co/5hMouXybNi #مركز_الأمن_السيبراني_للابحاث_والدراسات https://t.co/

    @ccforrs

    16 Apr 2026

    74 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  19. A insight into CVE-2025-55182 that was exploited in a 🇳🇬Bank ● CVSS 10, that's *Critical* risk. ● It has a EPSS of 66.27%, which is the probability of being exploited in the next 30 days. ● CVE-2025-55182 vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H Explan

    @WaleMicaiah

    16 Apr 2026

    144 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  20. 35 AI-generated CVEs disclosed in March. 6 in January. A 5x jump in 60 days. CVE-2025-55182 alone breached 766 production hosts. If your coding agent runs in someone else's cloud, their sandbox bug is your incident. Managed OpenClaw keeps Claude Code behind your firewall.

    @musiol_martin

    15 Apr 2026

    147 Impressions

    0 Retweets

    1 Like

    0 Bookmarks

    0 Replies

    0 Quotes

  21. PoC-CVE-2025-55182 #exploit Proof-of-concept exploit for CVE-2025-55182 (React2Shell) https://t.co/zrUupnstCv https://t.co/oMuXh1odV5

    @Sadishyt

    15 Apr 2026

    166 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  22. “Mhamaya ki Maaya” 6th bounty 🎯 6th in a row for Unauthenticated RCE (CVE-2025-55182). Big thanks to Bhagirath Saxena for guidance 🙌 Open for collab with serious full-time bug hunters. Let’s build 🔥 #BugBounty #Infosec #RCE #EthicalHacking #SecurityResearch htt

    @n00bhack3rr

    15 Apr 2026

    151 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  23. 🔒 #CyberSecurity How to Defend Against React2Shell (CVE-2025-55182) Attacks on Next.js "A recent wave of attacks has targeted the web development ecosystem, specifically…" 🔗 https://t.co/CqrNNaXpHf #CyberSecurity #ThreatIntel #incidentresponse #ransomware #forensics

    @SecurityAr58409

    15 Apr 2026

    47 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  24. CVE-2025-55182 is actively burning Next.js infrastructure. 766 confirmed hosts hit, attackers walking out with .env files: DB creds, SSH keys, AWS secrets. Check your middleware auth config. This isn't theoretical — it's happening right now. #webappsec #pentest

    @RedTeamGuides

    14 Apr 2026

    2 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  25. React2Shell (CVE-2025-55182) is already being actively exploited against Next.js systems worldwide. Don’t just hear about it, understand it: https://t.co/nkv1selTvQ @three_cube @DI0256 @IamSmouk @co11ateral https://t.co/cnEKn1Fb1c

    @_aircorridor

    14 Apr 2026

    1519 Impressions

    8 Retweets

    21 Likes

    14 Bookmarks

    0 Replies

    0 Quotes

  26. Stripe keys, SSH credentials, cloud tokens, and database strings were harvested from hundreds of web servers through one unpatched vulnerability. We analysed how UAT-10608 exploits React2Shell (CVE-2025-55182) and how to address this. Read more: https://t.co/cZIDSeq23A

    @PurpleIrisHQ

    14 Apr 2026

    177 Impressions

    7 Retweets

    7 Likes

    1 Bookmark

    0 Replies

    0 Quotes

  27. #Hackers #Exploit CVE-2025-55182 to Breach 766 #Nextjs Hosts, #StealCredentials https://t.co/jZwPTWCaAq

    @miguelcarvajalm

    12 Apr 2026

    162 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  28. 🚨 React2Shell (CVE-2025-55182) is being actively exploited RIGHT NOW — critical RCE hitting Next.js & React Server Components!I just built a free online checker — scan your site in seconds:📷https://t.co/1y5KXWsBtR

    @geteasykit

    11 Apr 2026

    8 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  29. 🚨 Released: Rust CVE-2025-55182 Scanner High-performance scanner for detecting React Server Components RCE (React2Shell). Built in Rust for speed, concurrency, and large-scale scanning. GitHub: https://t.co/Sj8Okv7xfh #cybersecurity #hacking_tool https://t.co/RpeGjL1On5

    @kaxm231

    11 Apr 2026

    192 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  30. This vulnerability allows RCE in React Server Functions, e.g. as offered by Next.js through insecure prototype references. CVE-2025-55182 https://t.co/bnw2BQIcMA

    @NullSecurityX

    11 Apr 2026

    5455 Impressions

    9 Retweets

    105 Likes

    47 Bookmarks

    1 Reply

    1 Quote

  31. React2Shell (CVE-2025-55182) was exploited within 2 days of public disclosure. Attackers executed commands in Kubernetes workloads, installing backdoors and stealing data. Application exploits lead to cluster compromise. Read our analysis: https://t.co/x50iTPTcl0 https://t.co/g9y

    @Unit42_Intel

    10 Apr 2026

    4057 Impressions

    14 Retweets

    41 Likes

    18 Bookmarks

    0 Replies

    1 Quote

  32. 脆弱性 React2Shell の悪用を検出:自動化された大規模クレデンシャル窃取キャンペーン https://t.co/ioFiYIO4Ka このキャンペーンの背景にあるのは、Next.js アプリケーションに存在する React2Shell (CVE-2025-55182) という脆

    @iototsecnews

    10 Apr 2026

    239 Impressions

    0 Retweets

    0 Likes

    1 Bookmark

    0 Replies

    1 Quote

  33. تحدي ثغرة CVE-2025-55182 كان اختبار للصبر عدلت السكريبت يدوياً بعد فشل الأدوات واجهت تعليق في الـ Shell وحليته بتغيير الـ Ports صححت الـ Payload ليناسب بيئة Alpine الختا

    @0xsb3lr

    9 Apr 2026

    161 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  34. Next.jsの脆弱性、React2Shell(CVE-2025-55182)を悪用するサイバー攻撃 キャンペーン https://t.co/R8qIUHrdeN #セキュリティ対策Lab #セキュリティ #Security #CybersecurityNews #DataBreach

    @securityLab_jp

    9 Apr 2026

    236 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  35. Kinsing has resurfaced on fresh infrastructure, targeting ActiveMQ, Metabase, and React2Shell. First observed using CVE-2025-55182 in VulnCheck data. Old malware, new opportunities. Check out the analysis and IOCs: https://t.co/LL7Q3kU2Fv

    @VulnCheckAI

    8 Apr 2026

    279 Impressions

    1 Retweet

    3 Likes

    1 Bookmark

    0 Replies

    0 Quotes

  36. Kubernetes attacks are exploding 🚨 CVE-2025-55182, a critical React vulnerability (CVSS 10.0), is under active exploitation. Attackers can execute remote code via HTTP requests, targeting cloud and Kubernetes workloads to gain container access and deploy malware. https://t.c

    @AIElementrix

    8 Apr 2026

    471 Impressions

    0 Retweets

    3 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  37. Got hit by React2Shell (CVE-2025-55182) on Azure App, Next.js 15.1.7 + React 19. Here's what happened and how I fixed it. https://t.co/Jop2CtTkqD #NextJS #React #WebSecurity #CVE202555182 #React2Shell #Azure

    @moelboudali

    8 Apr 2026

    150 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  38. ⚠️ Threat Update: Next.js React2Shell Credential Theft Campaign 📝 Key Updates Summary: UPDATE: Consolidated record retains Cisco Talos technical detail (UAT-10608, CVE-2025-55182) and confirms rapid exploitation with at least 766 hosts compromised in a 24‑hour window an

    @syedaquib77

    7 Apr 2026

    117 Impressions

    0 Retweets

    0 Likes

    1 Bookmark

    0 Replies

    0 Quotes

  39. 🚨 React2Shell Exploitation at Scale: 700+ Systems Breached in Global Campaign https://t.co/OddOMVLOpk A large-scale campaign is exploiting React2Shell (CVE-2025-55182) to compromise exposed Next.js apps and harvest credentials at scale. At least 766 systems across industrie

    @Huntio

    7 Apr 2026

    1684 Impressions

    6 Retweets

    27 Likes

    9 Bookmarks

    0 Replies

    0 Quotes

  40. 【Hackers Exploit Next.js React2Shell Vulnerability, Breach 766 Hosts in 24 Hours】 Next.js/React Server Componentsの脆弱性 React2Shell(CVE-2025-55182)が実際に悪用され、Cisco Talosによると24時間で少なくとも766ホストが侵害されたと報じら

    @01ra66it

    7 Apr 2026

    65 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  41. React2Shell (CVE-2025-55182): RCE sin autenticación en apps React/Next.js. Impacto real: Robo de tokens y API keys Credenciales cloud expuestas Explotación activa en campañas reales Si usas Next.js: parchea, audita secretos y monitoriza accesos. #CyberSecurity #NextJS #Rea

    @MMarcoSeguridad

    7 Apr 2026

    73 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  42. Kubernetes token theft surged 282% YoY, enabling lateral moves in cloud backends. Slow Pisces exploited crypto exchange pods; React2Shell (CVE-2025-55182) used for remote command execution inside workloads. #CloudSecurity #KubernetesRisks #Crypto https://t.co/AwfYM4DJYO

    @TweetThreatNews

    7 Apr 2026

    281 Impressions

    0 Retweets

    2 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  43. NEW THREAT INTEL: React2Shell CVE-2025-55182 - CVSS 10.0 Kubernetes RCE driving 282% surge in token-theft ops. 9 detections, 22 IOCs. https://t.co/5InLuCDKmt #ThreatIntel #CyberSecurity #Kubernetes #CVE https://t.co/1X49ikXNTY

    @threadlinqs

    7 Apr 2026

    143 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  44. NEW THREAT INTEL: React2Shell CVE-2025-55182 -- K8s token-theft surge with Slow Pisces and cloud-native actors. 9 detections, 22 IOCs. https://t.co/5InLuCDKmt #ThreatIntel #CyberSecurity #Kubernetes #CVE https://t.co/4zq34Qlpo4

    @threadlinqs

    7 Apr 2026

    121 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  45. 🚨Una vulnerabilidad crítica (React2Shell – CVE-2025-55182) en Next.js está siendo explotada para ejecutar código remoto y robar credenciales de servidores sin parches. El ataque ya comprometió cientos de sistemas en horas. El parche existe desde hace meses: aplicar de in

    @nodoware_news

    6 Apr 2026

    105 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  46. 766 systems breached through React2Shell vulnerability in hours. 10,000+ AWS keys, SSH credentials, and API tokens harvested automatically. CVE-2025-55182 has perfect 10.0 C https://t.co/ab9MBIfVaX

    @PTGLondon

    6 Apr 2026

    129 Impressions

    0 Retweets

    1 Like

    0 Bookmarks

    1 Reply

    0 Quotes

  47. After deleting my X and GitHub accounts multiple times, here’s a reupload of an old CVE automation script I built some time ago (#CVE-2025-55182) This is just a reupload, more substantial work is coming. Peace. @hexsh1dow https://t.co/hq8m5fMQnk

    @hexsh1dow

    6 Apr 2026

    869 Impressions

    4 Retweets

    14 Likes

    3 Bookmarks

    0 Replies

    0 Quotes

  48. UAT-10608 exploited React2Shell (CVE-2025-55182) to deploy NEXUS Listener across 766+ compromised hosts. Attackers automated credential harvesting then used stolen cloud tokens for lateral movement across environments. Runtime segmentation helps limit blast radius when

    @aviatrixtrc

    6 Apr 2026

    132 Impressions

    0 Retweets

    1 Like

    0 Bookmarks

    1 Reply

    0 Quotes

  49. ⚠️ Threat Update: Automated Credential Harvesting Exploiting React2Shell (UAT-10608) — React2Shell (CVE-2025-55182) 📝 Key Updates Summary: UPDATE: Cisco Talos confirmed at least **766 compromised hosts** as of 2026-04-06 and added explicit evidence of large-scale automa

    @syedaquib77

    6 Apr 2026

    101 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  50. Hackers exploited React2Shell (CVE-2025-55182) in Next.js apps, compromising 766+ hosts to steal environment secrets, SSH keys, API keys, and cloud tokens. Cisco Talos links this to UAT-10608 cluster. #React2Shell #Nextjs #UAT https://t.co/ZdhTguYkrI

    @TweetThreatNews

    6 Apr 2026

    214 Impressions

    0 Retweets

    1 Like

    0 Bookmarks

    0 Replies

    0 Quotes

Configurations