A maximum-severity vulnerability in the React Server Components (RSC) “Flight” protocol, widely referred to as React2Shell, allows unauthenticated remote code execution against servers running affected React 19, Next.js, and additional JavaScript frameworks and applications. React has assigned CVE-2025-55182 with a CVSS score of 10.0, and Next.js has tracked its downstream impact as CVE-2025-66478.
The NodeZero® Offensive Security Platform now includes a dedicated Rapid Response test so you can quickly verify whether these flaws are exploitable in your environment and validate that your patches and mitigations actually removed the risk.
React Server Components use the Flight protocol to send serialized component trees from server to client. Frameworks and bundlers such as Next.js, Vite, Parcel, and React Router integrate these server packages to enable server functions and RSC endpoints.
CVE-2025-55182 is a logical deserialization vulnerability in how React decodes payloads sent to React Server Function endpoints. When a server receives a specially crafted RSC/Flight payload, it fails to properly validate the structure and ends up executing attacker-controlled inputs on the server, leading to remote code execution.
Key technical characteristics:
CVE-2025-66478 tracks the downstream impact on Next.js: experimental canary builds starting with 14.3.0-canary.77, and 15.x and 16.x App Router releases below the patched versions, all inherit the same RCE issue through their use of React Server and Flight.
React powers millions of websites and sees over 55 million weekly downloads from npm, while Next.js counts more than 16 million weekly downloads. Analysis suggests roughly 39% of observed cloud environments contain vulnerable React or Next.js instances.
From a risk standpoint, successful exploitation gives an attacker code execution on the application server handling page rendering and server functions. As your internal GTM guide already notes, this can enable theft of secrets such as API keys and database credentials, installation of backdoors, and potential pivoting deeper into backend services.
Public reporting to date focuses on vulnerable versions, exploit mechanics, and patch guidance, not on concrete, vendor-supplied IoCs for this specific bug.
However, because this is an unauthenticated RCE in a web server context, defenders can use generic RCE hunting patterns while waiting for more specific IoCs from React, Vercel, or their security vendors. Examples include:
These are generic behavioral indicators, not official IoCs supplied by React, Vercel, or Horizon3.ai. They should complement, not replace, vendor-specific signatures and WAF rules as they become available. es as they become available.
React
The issue resides in how React decodes payloads sent to React Server Function endpoints in the RSC Flight protocol. Even applications that do not implement explicit server function endpoints may still be vulnerable if React Server Components are enabled.
Other frameworks and integrations
Wiz and other researchers have highlighted that additional frameworks implementing React Server and Flight may be vulnerable, including: React Router RSC, Vite RSC plugin, Parcel RSC plugin, RedwoodSDK, and Waku. Confirm guidance from each project’s advisory and upgrade to their recommended patched versions.
🔗 React advisory for CVE-2025-55182 (React Server Components / Flight RCE)
🔗 SecurityWeek — “React2Shell: In-the-Wild Exploitation Expected for Critical React Vulnerability”
🔗 BleepingComputer — “Critical React, Next.js flaw lets hackers execute code on servers”
🔗 Dark Reading — “Critical React Flaw Triggers Calls for Immediate Action”
The NodeZero® platform empowers your organization to reduce your security risks by autonomously finding exploitable weaknesses in your network, giving you detailed guidance around how to priortize and fix them, and having you immediately verify that your fixes are effective.