React2Shell: Tracking CVE-2025-55182 in React Server Components

React being attacked due to React Server Components

Dec 22, 2025

React2Shell (CVE-2025-55182) was disclosed in the React team's December 3, 2025 advisory, affecting React Server Components. The issue allows attacker-controlled payloads to reach shell execution on the server when frameworks pass React Server Component (RSC) stream data into OS-level utilities. For teams tracking multi-platform exposure, treat this as a high-confidence remote code execution risk.

Who is affected

  • React applications using Server Components on vulnerable React releases prior to patched builds noted in the official advisory.
  • Next.js App Router deployments built on those React versions (self-hosted or managed), including container images that bundle the vulnerable runtime.
  • Custom RSC-capable frameworks and SSR services that forward request context into server renderers, especially when shelling out for image processing, logging, PDF rendering, or CLI-based tooling.

What happened (blog summary)

  • The React team reports that specially crafted RSC payloads can trigger command execution when serialized server component data reaches shell utilities.
  • The attack path is enabled by unsafe handling of untrusted input inside the RSC streaming and hydration pipeline.
  • Patched React builds and framework updates were released; the advisory lists fixed versions and mitigations.

Risks and impact

  • Remote code execution with the privileges of the React server process.
  • Exposure of environment secrets, source code, and potential lateral movement into adjacent services.
  • Downtime or supply-chain pollution if attackers sabotage build artifacts or runtime dependencies.

How to respond if you might be vulnerable

  1. Identify: Inventory services using React Server Components or Next.js App Router. Confirm the React version and match it against the patched releases in the advisory.
  2. Patch: Upgrade React to the fixed version and redeploy. For Next.js, update to the first patched App Router release that bundles the fixed React runtime.
  3. Redeploy: Rebuild images/containers and invalidate caches or CDN artifacts that may ship vulnerable bundles.
  4. Monitor: Review server and container logs for suspicious shell activity or unexpected CLI invocations since the vulnerability window opened.
  5. Contain: Rotate credentials, access tokens, and secrets that were present on the affected hosts.

Forward-looking hardening

  • Keep untrusted input out of shell invocations; prefer library calls over CLI tooling.
  • Apply strict content validation and encoding for data entering the RSC pipeline.
  • Run server renderers under least-privilege accounts with network egress controls.
  • Isolate build and runtime environments; do not share artifacts between trusted and untrusted tenants.
  • Add regression tests that simulate hostile RSC payloads to ensure patched behavior persists.

References

Share

Older: Zero-Click Attacks: The Silent Threat to Your Digital Security