React2Shell (CVE-2025-55182) - Critical unauthenticated RCE affecting React Server Components

Dec 4 2025

Overview

Update: As of 4:30PM Eastern, Rapid7 has validated that a working weaponized proof-of-concept exploit, shared by researcher @maple3142, is now publicly available.

On December 3, 2025, Meta disclosed a new vulnerability, CVE-2025-55182, which has since been dubbed React2Shell. A second CVE identifier, CVE-2025-66478, was assigned and published to track the vulnerability in the context of Next.js. However this second CVE has since been rejected as a duplicate of CVE-2025-55182, as the root cause in all cases is the same and should be referred to with a single common CVE identifier.

CVE-2025-55182 is a critical unauthenticated remote code execution vulnerability affecting React, a very popular library for building modern web applications. This new vulnerability has a CVSS rating of 10.0, which is the maximum rating possible and indicates the highly critical nature of the issue. Successful exploitation of CVE-2025-55182 allows a remote unauthenticated attacker to execute arbitrary code on an affected server via malicious HTTP requests.

The vulnerability affects React applications that support React Server Components. While the vulnerability affects the React Server Components feature, server applications may still be vulnerable even if the application does not explicitly implement any React Server Function endpoints but does support React Server Components. Additionally, many popular frameworks based on React, such as Next.js, are also affected by this vulnerability.

A separate advisory was published by Vercel, the vendor for Next.js. This advisory tracks the impact of CVE-2025-55182 as it applies to the Next.js framework, and provides information for Next.js users to remediate the issue. 

As of this blog’s publication on December 4, 2025, there is no known public exploit code available. Several exploits have been published claiming to exploit CVE-2025-55182; however, they have not been successfully verified as actually exploiting this vulnerability. This has been noted in the original finder’s website, react2shell.com. Although broad exploitation has not yet begun, we expect this to quickly change once a viable public exploit becomes available.

Organizations who use React or the affected downstream frameworks are urged to remediate this vulnerability on an urgent basis, outside of normal patch cycles and before broad exploitation begins.

Mitigation guidance

CVE-2025-55182 affects versions 19.0, 19.1.0, 19.1.1, and 19.2.0 of the following React packages:

A vendor-supplied update for the above packages is available in versions 19.0.1, 19.1.2, and 19.2.1. Users of affected React packages are advised to update to the latest remediated version on an urgent basis.

Downstream frameworks that depend on React are also affected, this includes (but is not limited to):

For the latest mitigation guidance for React, please refer to the React security advisory. For the latest mitigation guidance specific to Next.js, please refer to the Vercel security advisory.

Rapid7 customers

Exposure Command, InsightVM and Nexpose

Exposure Command, InsightVM and Nexpose customers can assess exposure to CVE-2025-55182 with an unauthenticated check available in today's (December 4) content release. Note that the "Potential" check type must be enabled before running the scan to successfully assess for the vulnerability.

Updates

  • December 4, 2025: Several minor edits for punctuation and grammar.
  • December 4, 2025: Coverage availability for Rapid 7 customers.
  • December 4, 2025: PoC validation updated.

Read more

Recommended Jobs

Enterprise Account Executive (Arizona)

Remote Location, AZ, United States, 85001 Sales & BD
*Actively looking for someone in Arizona*   In this role, you will partner cross-functionally with internal teams to drive net-new and renewal business opportunities with Enterprise accounts in AZ, from initial prospecting through negotiation and ...

Account Executive, Commercial Accounts

120 Causeway Street, Boston, MA, United States, 02114 Sales & BD
Rapid7’s Commercial Sales organization is seeking an Account Executive to join the team. You will serve as a strategic partner for clients in your assigned geography, helping them achieve a more secure digital future. In this quota carrying role, ...

Systems Administrator

Remote location, Pune, India, 411001 Information Technology
About the Role:We are looking for a Systems Administrator based in India to join our globally distributed IT infrastructure team. This individual will play a key role in supporting and managing our cloud infrastructure, enterprise endpoints, and s...

Senior Escalation Manager, Global Support

Water Street, Tampa, FL, United States, 33602 Business Support
Senior Escalation Manager, Global Support Job Summary We’re looking for a Senior Escalation Manager to lead Rapid7’s most complex, high-stakes customer escalations. In this role, you’ll ensure fast resolution, executive-ready communication, and ...

Technical Account Manager (Tampa/Austin)

Water Street, Tampa, FL, United States, 33602. Austin, TX, United States, 78701 Technical Support
Job Description As a Technical Account Manager (TAM), you will be responsible for managing the technical relationship between Rapid7 and its large enterprise and federal customers. As a trusted advisor, the TAM will manage the technical success of...

Technical Account Manager

Water Street, Tampa, FL, United States, 33602 Technical Support
Technical Account Manager Job Summary As a Technical Account Manager (TAM), you will be responsible for managing the technical relationship between Rapid7 and its largest enterprise and federal customers. Acting as a trusted advisor, you will guid...