Critical React Vulnerability (React Server Components) Added to CISA Exploited-Vulnerabilities List After Active “React2Shell” Attacks

The article reports that the vulnerability known as React2Shell (CVE-2025-55182), a critical remote-code-execution bug in React Server Components with a maximum severity score (CVSS 10.0), has been officially included by CISA in its catalog of exploited vulnerabilities. The flaw — an insecure deserialization issue in how React decodes payloads sent to server endpoints — can be triggered by an unauthenticated attacker sending a specially crafted HTTP request, allowing arbitrary code execution on affected servers. According to the advisory, the vulnerability affects React packages (react-server-dom-webpack, react-server-dom-parcel, react-server-dom-turbopack) in versions 19.0.0 through 19.2.0. The bug also impacts frameworks built on React (notably Next.js), even when applications do not explicitly use server functions but simply support server components. Exploitation was observed in the wild soon after disclosure, including use by China-linked threat actors, prompting urgent calls for patching to the fixed versions (e.g. React 19.2.1 and updated Next.js releases). 

https://thehackernews.com/2025/12/critical-react2shell-flaw-added-to-cisa.html

Comments

Popular posts from this blog

Prompt Engineering Demands Rigorous Evaluation

Secure Vibe Coding Guide: Best Practices for Writing Secure Code

KEVIntel: Real-Time Intelligence on Exploited Vulnerabilities